General

  • Target

    2704-14-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    2e4899cda889930a9d7d2c7e5ea70e83

  • SHA1

    3c706adff386067ca9968d914b5141b9fc9b934c

  • SHA256

    b3f744b7f4279ee2acc7c42eb7f2372a04ae94ad8a648bae7c8cf10458f422de

  • SHA512

    aef2f0d786c341d20dcd5f49c403968128b1d25ad9d0ef3a556346dc4323df6b18ce9c504780c90e6ab00eb7659211b85f786b1add73c3f67bba9f071e0aeeef

  • SSDEEP

    3072:It1PdhaH88ECg9s3X2zb5MHdmmWOwvcXbYgbY:WdUd2biHvhb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7985379579:AAFFNXAHJz6n24A6xEGgMMms826UxvjorNA/sendMessage?chat_id=6370711846

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2704-14-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections