General

  • Target

    636-68-0x0000000000400000-0x0000000000437000-memory.dmp

  • Size

    220KB

  • MD5

    bb8fe39cc5585ca5cdfcd7d42a8bcdd4

  • SHA1

    6336625bc99d8fbf246a0efe535e1e688bb27d92

  • SHA256

    ec5aa0ed1fc8497665f8a6255b8c7bd4d02cb3bb13473941c60acb7b21ab4672

  • SHA512

    7be14d76357844bb2e68a5f3173b3affd16a987f2db9472adc27d6d6afcc478365023f0150cd21932b0653fd04bfd7358961b3811592b1feb7a0ffd9692cfb7c

  • SSDEEP

    3072:IGybM97hOQ/iK2jrOyipV/XbKjv918lh6h0Skd508WnVSClw7yEaJbY1sUI+twBW:5DthOzj8VzKmVSkMRZJboZQb

Malware Config

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family

Files

  • 636-68-0x0000000000400000-0x0000000000437000-memory.dmp
    .exe windows x86


    Headers

    Sections