General

  • Target

    2944-20-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    0d99e623ed2dbe77b683eb00811d04be

  • SHA1

    e73676a65174f0906c3c5ca4e56b65521def42a3

  • SHA256

    cb5776a9aeda937eb93705387c37d09d90f081097c02e15b3698cbf39459200a

  • SHA512

    69aea798121556b9a8d021444eea2eedd70eca7da4b5f747db226a387ada3fe1ca3622a0b76c9f2e8ee3ffc961247795c34d7c9d2c39f87006ebb2a96b117002

  • SSDEEP

    3072:y99yINAgKjV545jbvk5Hbe7fMuJN07TBqKj+EmfJ9K4b5bPmmmWMIwvcXvQgbY:1INAgKjV5Cjbvk5Hbe7fMuJN07T49K49

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7692220058:AAEny12fSzuKXI7iNJaESECu5UR80nmwLAQ/sendMessage?chat_id=7342994424

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2944-20-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections