General

  • Target

    980-64-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    fd451d40a3c753dc6f24626975944261

  • SHA1

    813eab43f78bf8ca71e4240485a6127c48833179

  • SHA256

    c5bbed688e393b33381d95b46882c9a8d7403aa1eb3fac5ff8ebb7f71622fcb9

  • SHA512

    a4c7be1e690d5ff5a24f4c258e3e811df72a5e323b5700dfe134a35b63aaab0a278c42a1796ada62e2dfacb5d73c5b51b2129d21632cbb113d8d616b9467aaba

  • SSDEEP

    1536:1tMpEvqHEIsanj0ly+G0/nE+vBUFrlY9DZKkAMFAL0HbKu1Klh7wcpiOWB8F0Kcl:1tMKH7/tDZ5bfMY2wB8FbY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5843567515:AAEdtJWwcJKNn64U81CKVdG-li_Ejds8raM/sendMessage?chat_id=1639214896

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 980-64-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections