General

  • Target

    804-64-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    6addcf261056ea17e57f5e07c2968bac

  • SHA1

    dfa1db530851fa4ba049c04c2fb153fd66cf5d10

  • SHA256

    4601436d006cb1a501a5cf72e6b1e415296379738f5792703f48c6483d614722

  • SHA512

    24deb4ef73192024f68d7be5b3b3de29d7e27856d687764e26b861f6cd86b51ee598fa8fdb6834f12cd9ac031992c53d70caad59d9c725cf916405412782ee5b

  • SSDEEP

    1536:9XJpR8VTAIYIY+H4X48xPI1S9t4PrhQRYIbKurZzWpiO5BKvF0Kcl:RJpWV8NZP34PrmFbfVzQfBKvFbY

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family

Files

  • 804-64-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections