General

  • Target

    2004-62-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    5048ed7a44bd02e09ebbfbdbb2b8bade

  • SHA1

    455a93b14a09614bcecf785d38a642495b715289

  • SHA256

    f3504d1983d5564f5c0ed04af795a26a701593c7bf1a4bccb748e6f5916f15a6

  • SHA512

    ece0c365787c41e93fce55015235cdf1fa712df15ce91e4d5002c4d30015e9883cc39df46fccd12771ddf9435fb5e53d5e90682216a75286c5a40f3188f96a38

  • SSDEEP

    1536:0tMpEvqHEIsanj0ly+G0/nE+vBUFrlY9DZKkAMFFV/zkQgkbKui9+szxlbi8zpin:0tMKH7/tDZvx2kbfelbBwB

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6184450589:AAFIdcqJgDnNznaPK_xiDFODq_veiD4WNMg/sendMessage?chat_id=1921763965

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2004-62-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections