General

  • Target

    1480-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    c0e003ad30eb29d35d88487aa1224731

  • SHA1

    517b90ac8eb1218b0fc2266e396bcb5b8010873f

  • SHA256

    1a9cf25a072c2300cf0000642318aab94e2ece24866275918062953cd1599295

  • SHA512

    87ca66afb530a65ad0cc8fd206662ea39ac56136bffc6467ff0c6183af557f4e0cd832ff2e3824aefc860276049200c0937e1eb5eeae5638d8b62b10a76bbbd1

  • SSDEEP

    1536:+tMpEvqHEIsang0ly+G0/nE+vBUFrlY9DZKkAMFF/gDdNPVuYxIbKuOdhBsHiIfg:+tMKHE/tDZvcdNPYbfKhm8qwB

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5905114115:AAEtJ13Y8sU1fQgR9KsdZZhYCIQmu7J2ahU/sendMessage?chat_id=5334267822

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family

Files

  • 1480-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections