General

  • Target

    984-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    f5c68b1895e0069dc59c961c037d1042

  • SHA1

    25ec55428a617a5528f20bd7996f6cba23b4dc6b

  • SHA256

    beff668812c54681ad3c0682426af27ee5ffdff30540e5c362d8b5c1761eddb3

  • SHA512

    f6a3d994b8454de540f4409eaf74e705ad7f395faaeb03e70f39390f99fd30679c1b373e2cdea74e0638b037159c0360afa74d84809735bb8722bf01f544322f

  • SSDEEP

    1536:jtMpEvqHEIsanVdLQPqsUr++MFjLT7pXN7ZbKuv2v9HeIdBc2RdpiOWB:jtMKHgLBsUr+XL3VbfOvReGBc2nwB

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5821342098:AAHVn7ZsJfUztL74EsKZETIvdny3xSDSWow/sendMessage?chat_id=1467583453

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family

Files

  • 984-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections