General

  • Target

    1496-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    cd23ddb7f887288f3e9414724c9c3e8a

  • SHA1

    04572a9f37ca6791a1812e57f8bc0b18e94ad787

  • SHA256

    3edf46b8dfba8f1d057698012a85a732197cc75ac1fbffbbeec26844c8e45565

  • SHA512

    560ff533a3fa16e10df7fbfabd439ee045fef284bb30b3e2fb4fae92589fe87d9c05535363a2340509efafe991a971b66a10e81255567cde5ff94b11337454cc

  • SSDEEP

    1536:ctMpEvqHEIsanVdLQPqsUr++MFjm1kXuHCjAfbKuE+arnETpiOWB7F0Kcl:ctMKHgLBsUr+XmSuHCObfYrE9wB7FbY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6175277595:AAFUeQAqIxy_tMM5DYmodWynDJwrUUHw-lo/sendMessage?chat_id=1467583453

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family

Files

  • 1496-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections