General

  • Target

    988-68-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    4691f8bd7351bab13f6dd114a7e3a9c5

  • SHA1

    66c91c24555eef104d591817150607b4ecee3a85

  • SHA256

    07eb1aece1f6e60a9ad721c21da3a3118719e54c5d289e8961a84d1f32937de8

  • SHA512

    3280c6f2581fd6aebdc0bbc584c771344928e332e277b965f5a8121c131ea96a09621a6f660aecef09d7d5dbc94e56e86e260ff6d25709c20d97d816f8cda7b7

  • SSDEEP

    1536:JtMpEvqHEIsanj0ly+G0/nE+vBUFrlY9DZKkAMFQ3nvn/bKuOL5ybQpiOWB:JtMKH7/tDZmXv/bfYUbCwB

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5923227859:AAEYo__DCK9GpHPQHPaQXx_5mU4DPDQb_xs/sendMessage?chat_id=1965959123

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 988-68-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections