General

  • Target

    2932-9-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    6622d1e2fb3bc358f01b7de0ea62f4ff

  • SHA1

    6e162b884a90c80b9e5eb9bb72396d9290a97221

  • SHA256

    22d42bdb27c59d6a871cfd3a24ee7567c0fc9a5d61afa3e30546c420912c6a31

  • SHA512

    1f87e01e11a949fef71ee17d5102171067facadafae4b32de1edf3213c9266cfa87b847c9c53519ce55d7dbb51714b9de18a879c482bffeccab043ab26b09728

  • SSDEEP

    3072:It1PdhaH88ECg9s3X2zb5MHdmmWOwvcXb:WdUd2biHv

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7985379579:AAFFNXAHJz6n24A6xEGgMMms826UxvjorNA/sendMessage?chat_id=6370711846

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2932-9-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections