General

  • Target

    5020-11-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    3f9140e7687cbf90928090efc4a7fc2e

  • SHA1

    8c829a71a059d4bfb556916ee05e228310157118

  • SHA256

    6d31f20c4f59fbcefdaca9a2cf85b534888aaddabaf96a3c8e1e021c4a35475b

  • SHA512

    548871f018a91e1348d5fb0466b4d7a701a0d0bb7d8a45ef925147785610acff657dcfb9830d8fda11f3520e95426681c44661c4c6a78865fa459004c1b18a64

  • SSDEEP

    3072:pvDdI8CN564+4V4v4z4G43424A464y4K4v4f4u4A494V4t4w4H4j4Y4Y4s4P4W4E:bIxN+hZ1SZbuMjb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7835278469:AAGF5_NMraTLjuJJtDp20z1IPRxT8CDKsWQ/sendMessage?chat_id=6306771742

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5020-11-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections