General

  • Target

    1512-65-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    c363fccaa4b280eada4ee91a2f062fc4

  • SHA1

    5d7b2bc3bbeaa92ffcc098eaaf1a4c2ef417cf26

  • SHA256

    bfa9e14f47f26df0f609b28197c6010689dcd17d3d06150ce3b6678c0a6a2231

  • SHA512

    9d6f697fd772a2e8f27c2ace90381d43f875a01477c9e0ed9cc89e1dc5e11b6868ecb2942a52bdaf30f4632902a411a7336ab2143d30a0e7f8ac9e22ad589597

  • SSDEEP

    1536:kFTaBREqlzQOhFcbJEwMFMkedep+mubKuIPiB2necVpiOWBE:kFTIRbXcbJEOkfp+DbfOBneIwB

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1512-65-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections