General

  • Target

    4996-233-0x0000000000850000-0x0000000001AA4000-memory.dmp

  • Size

    18.3MB

  • MD5

    397a53e9e2ea02fc7c2288c4dd2063ee

  • SHA1

    068eca479ffd10a2463069943eabbbebfab1b547

  • SHA256

    6c0915b6713f5568fa499ac3b8f39f4b845895abcc17f196840d30a8cf4d6437

  • SHA512

    c9f51eea2be5a3537a185dade97cccb65352eafc05adca984e01dbe4ab8a6c2276b13b6434ac5895d3de5fdb8a6acb8e4213432cc36a7de37267435e3b401b7a

  • SSDEEP

    3072:WvDdI8CN564+4V4v4z4G43424A464y4K4v4f4u4A494V4t4w4H4j4Y4Y4s4P4W4F:+IxNvKPbK7Vab

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7602241848:AAGOG1RAiVBKad-IMDgRf04J_SQO8x6g-hI/sendMessage?chat_id=5302361040

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4996-233-0x0000000000850000-0x0000000001AA4000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections