General

  • Target

    4448-130-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    ea928eb75bf9203d537398feb509c87e

  • SHA1

    976f7446100a1e69f8f4769d41912c73a028a35b

  • SHA256

    24cdf907f824c6bd38d46f4c9a43420ebb0393c9ca83904c9cb393873051496a

  • SHA512

    7604de8803dc1d1ee13fc2a3924201e9afe2a4c05a9a7d0b8e36534cd705d8da50e74b34bda73d6b25996b55dd6d529cc8bbf48942d4ab857f7697027442a6e8

  • SSDEEP

    3072:AdrrE3qmXisZCN5FU5gebfoPjwByNjFbY:wEDnUeb+zb

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4448-130-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections