General

  • Target

    1680-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    4308b07037b6261d96fff8b08a4f7a65

  • SHA1

    6cf69adc96d8e1d5668e752f05394ee2e440dd9b

  • SHA256

    12ee7f3ba55d1fe68317fedae4e53b6e6e692cb78f6a7530f0833be4fd5dc980

  • SHA512

    12cc9abe4b326f2efb69c6ba4bac9f8fbc25ec50e5ba390c743a2dc4a73b16ee30c3bd10299a12bbc112488b778980a3b9c2c424f9ddce588ab441a9b9f7b721

  • SSDEEP

    1536:dfZRqo7iytK1HQb8TD5S9tAnElcY46ClQbKuXWOFlrpiO5Bq:1ZRq/y2DMAnElc8bfG0lFfBq

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1680-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections