General

  • Target

    2660-20-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    e617759268a0d29b787b8adfab3a9bd7

  • SHA1

    eef90946229c3bb9bc21448be16073affe195914

  • SHA256

    164dd796330c98c87302484cc86e7653537d4c66ce6242f352cacdabb7958366

  • SHA512

    5a5a3424d4c463826e29c2e95ab4d7b3f31e87522e7fe671d3d3f8e6c39daf44ed5d1f630f7ab67940f741c54a040c41ccacdcecad3f1c9eba65e1fde977671e

  • SSDEEP

    3072:oN1S0dCSZm6QwkvATFEHJGFjrGqbl6P7pCYsQwwvxLo7LFgbY:bOCSs6QppDqbe7pCZ7Lmb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://scratchdreams.tk

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2660-20-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections