General

  • Target

    524-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    88245d092dd51aaabe4d9df7bf3d1b3b

  • SHA1

    ab92c9d38af5fe7e9a54c7a83c15d8f857bfafaa

  • SHA256

    6c7e8201e4bc64bee73ed7bcefbda064f2d7a8b94e79235e12cdc2ead490068e

  • SHA512

    e0d0362bc7b8f3f9ad0e1b6769bdc5cd2fcb866a19f4873bac58a1f134dbb492f3245b8841d76207c153ea81cdb7feb2ca561a138d5b16446768d041d6bdba1b

  • SSDEEP

    1536:2xIjRU6TkNeqQOYa5XwjBQ0oe5p4SUfn2ZZi2YAUSgUL2a2mRGQiZvwGvf7TmGF/:2xIje9Jvf7TmG/VtbYOHmoKwB

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family

Files

  • 524-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections