General

  • Target

    3052-25-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    4aa2b28e96fbb0b215ddd4fe2831d0ec

  • SHA1

    3ffeed252590717a5e19c39c25651a97c1faaddb

  • SHA256

    d3addc8ba162c736715ea9d4c6c0b35db5b13d26da67dd2c1f2adfdb1d982a64

  • SHA512

    4047f66f6b1a8abc31392e9f673c1eda6837a94592418305a4d3beeba85dae285be03bafa37bfaeca633b43691b016b4c91d6447463611d5a2a775da27bb0f78

  • SSDEEP

    3072:w99yINAgKjV545jbvk5Hbe7fMuJN07T+tVeGm06fTQ2sG8Bb5C5mWTwvcXyfgbY:jINAgKjV5Cjbvk5Hbe7fMuJN07TuObu+

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6956304715:AAGEsKc2_BChUeZlL8X0MH3xZIsug2zAAIA/sendMessage?chat_id=6939220311

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3052-25-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections