General

  • Target

    332-62-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    ae0263b6a1f2553e6678f6fa4ef3dd8c

  • SHA1

    18fb473e34136cf90185ee247c118389cbd1f4b2

  • SHA256

    9195a4ab2320f20fdbaf5acde281d5f283087287d0d2e4e151d162e79f9a797a

  • SHA512

    e3aa1d31a9b69f38499dc4b1c378470a06d3c87753bcaaf280548f02c2ef65c072bbdfa124e83e1dc067a3b6439a7649ca1a88494c04712188fa660f0879f216

  • SSDEEP

    1536:atMpEvqHEIsan14rp7+YeIPyxPQMFLpET9VClPgylFXsbKufmHwgpiOWBW:atMKHlrYYeIPyV9KTul4yl+bf+QSwBW

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6102267622:AAFFZ_GvUj4OisNxsdlwZ5OHZVEfanDQBf0/sendMessage?chat_id=6107719374

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family

Files

  • 332-62-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections