General

  • Target

    2532-12-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    62d32138223316aedbc115e97b8dd597

  • SHA1

    089a332845abebf913caa10114b03ed2226a5ce8

  • SHA256

    752d922d468856de189856d89d3df8c6237ab56ac52a0c301bea1d8227f6205d

  • SHA512

    6c5554db2c96a0bdb4b1760bdf4bc923d41c4054de701cfe3dcf9a1188a7712f2516e38229ae1f438005d51d20ea1e4442df6d4570dc61bd008034664d01ed9d

  • SSDEEP

    3072:zVJg2V2QyG3YZvp3UFbcrwxt5RMVbqwE5K1Kbv4XysDor2vrsHMKpHbaPimW8wvL:I2V2QyG3YZvpUFbcrwxt5RMVbqwE5K1F

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7301432976:AAH31iVg7cEj_CK4xnKcLgyVuIYziQoJStE/sendMessage?chat_id=1182519128

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2532-12-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections