General

  • Target

    2020-64-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    255ad50887fbaab6126e6334fa090da6

  • SHA1

    faac80fd8ff308adee2e3ad3038f5ef01a603026

  • SHA256

    e69bf32b4df59814d5e37c659614ed150c25f6edb45acec3db0b4bf2111fe70b

  • SHA512

    8e76d85b7ad7fd8d2f76f17dd0c939b5e2504e7b45efe48270aba392b6f18dc06547968cf234f5c11e950f4f55abd7d832d994abbeb4012e13f59013c9160f77

  • SSDEEP

    3072:EFlAi/s+PkZu0eLTd9LTuPtb8LZJzwBl:QvpPLK1bIO

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5246782840:AAE8J67YMh-tJZRW6KfZOqtgu2xjRdEktfM/sendMessage?chat_id=1714717430

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 2020-64-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections