General

  • Target

    2684-15-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    2741cbea6035d294e0e657df51b01ec2

  • SHA1

    72b088936286a354260bc5ad5678090a1bc10318

  • SHA256

    733ed9b3bee33c12469beb0a757b3290d31d8ae7ba28d2af64a3dcec399f20ce

  • SHA512

    a1745a43ad32c9519852605f3baab128090ea195afffe150da15cc86d2f359a4133e924774099b3a10e1a1d6c8acb70fdc16bb6fcf70ef564a83e5ab7ae6594b

  • SSDEEP

    3072:avDdI8CN564+4V4v4z4G43424A464y4K4v4f4u4A494V4t4w4H4j4Y4Y4s4P4W4y:SIxNa3bM0wb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8055495510:AAGjjx2olozS_1Cl8WNZ40y4V688zWzQeEs/sendMessage?chat_id=1437092720

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2684-15-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections