General

  • Target

    2280-15-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    14af36ddb54eefa02800b1d57c63ed0c

  • SHA1

    24237d0c624e0f6ecae382b130c586589db195ce

  • SHA256

    26e9f00ebd1c171f05b2176a8ff6dab8410d635c856945e1955f851c849eb5d3

  • SHA512

    fce37615e067819db539690ded5df7ff6599242b475d0f998a5e646ab287d0816ec81efe850461afb20e9862b3c4f0a7c9cdea7f14ea3ae1bff4b8de1f09f052

  • SSDEEP

    3072:zvDdI8Ca564+4V4v4z4G43424A464y4K4v4f4u4A494V4t4w4H4j4Y4Y4s4P4W49:dIxa5wbm0/b

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7720120586:AAEL1VybRIeGFqc29yI4D0-l0jQ_HF7ry5s/sendMessage?chat_id=6419839739

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2280-15-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections