General

  • Target

    1476-83-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    4f939bfc918c9c14e1e21fb41c97269d

  • SHA1

    c05d07dd5bd6c1d77072b0ce4adeb918b0a55d66

  • SHA256

    403e6feb1c6419a8e1b52130c53505f5dc271da5d5c9389ddd54455885591d5c

  • SHA512

    f82e317ab448bbb5914a4d11a78a8706781b525979117bd364dd4231ec680079b080a14c7630c4a52403caf0f00aaee12fe662eb533224f7cf17e349ffed0adb

  • SSDEEP

    1536:/mSDC28jydkBxyiSLMFeYn69FQk0bKugnTQdpiOWByN/F0Kcl:/mSDZf+xyiS/UKFcbfgn0nwByN/FbY

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1476-83-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections