General

  • Target

    576-64-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    ff8325b2f82cebd9634573baba6d763d

  • SHA1

    9047bb89b9e0af15f56181df93832ba09e267b00

  • SHA256

    028a83ba139322b1eed0f2c4cbaa43ec6b3f335bdd8d73358f57b548b6c2ae86

  • SHA512

    79ecad65fdf8cc0efd44c2810fafbb52d280a88267d410e5879d251d575d4d55086be6e3b80feb818c05f61a20abf8da821440029e0b389afca293e1446d1b72

  • SSDEEP

    1536:wtMpEvqHEIsanj0ly+G0/nE+vBUFrlY9DZKkAMFFxgfPpAbKuNJtbfpyJI0piOW0:wtMKH7/tDZv2abfmJIewBnFbY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6221660400:AAGb-WADrhdDFxd9kxzjtg3jdDw9-uvNVlM/sendMessage?chat_id=6200392710

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 576-64-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections