General

  • Target

    240-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    3a4fcb8f97733544c40737d0f6e87629

  • SHA1

    86e44b97fa7ac1f0bc7b303f31b6dac2a4b3230e

  • SHA256

    f14699637626c5fb10f73825a7c2e3bc672449e3c1cf43642497d99251362ec2

  • SHA512

    a9c76ab6cc1d130a1212ad6f7bcf88343abb8574953e14ebb9a6e49d9fedd72dbc9d66b3945211de3116c5b959b85684550ff69d63e122b3d8cabd5b80120c1e

  • SSDEEP

    1536:xhRqo7iytuRxTfUM+bZDg8ksNUgBGHMbKu/Uq6qfMpiO5BN:xhRq/y5bhksLLbfMWmfBN

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 240-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections