General

  • Target

    868-66-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    8a03d385ca4f6014eb231d7c0d6dc5f9

  • SHA1

    2874ca3c06852cc5903f0e5947a1d876209f59f9

  • SHA256

    12ab9d5321df17bc4c5c121881ca35f7ff962a2a95071dd10d4b1d628d288137

  • SHA512

    9495d50bd911d6bb90e06b3f0b17b1cc63937330c3d3732fdf146fd9f77003349b89a324cf2aa7304978e9f888af0693f08da5477d7740f6316c0be93708c037

  • SSDEEP

    1536:+tMpEvqHEIsang0ly+G0/nE+vBUFrlY9DZKkAMFF/gDdNPVuYxIbKuOdhBsHiIf7:+tMKHE/tDZvcdNPYbfKhm8qwBnFbY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5905114115:AAEtJ13Y8sU1fQgR9KsdZZhYCIQmu7J2ahU/sendMessage?chat_id=5334267822

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family

Files

  • 868-66-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections