General

  • Target

    1544-131-0x0000000000250000-0x0000000000836000-memory.dmp

  • Size

    5.9MB

  • MD5

    8d194d7a894e23f1854ee188f6b9fb37

  • SHA1

    c73d2ab4d9182dafe1c6a300bf1dd3692bb5870e

  • SHA256

    234771217078dc0ae9f146c0233b75834de33ce8fdc07dbd3479dd881284e5ee

  • SHA512

    5e9592433b4e056034a54281510d4e6742188855a91c020718d76c62f09825636a5313c703cf927ec1dbf5204aa9234ac838c3eb1909062a477c0a7c56bb4a69

  • SSDEEP

    1536:btMpEvqHEIsan14rp7+YeIPyxPQMFLqBqhuCFWbKuTGvtSzEpiOWBWvF0Kcl:btMKHlrYYeIPyV9qkhGbfVzuwBWvFbY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6160036640:AAHqrAdmG4_GQkcLvxoups3k8WSEUC34w1g/sendMessage?chat_id=2052461776

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1544-131-0x0000000000250000-0x0000000000836000-memory.dmp
    .exe windows x86


    Headers

    Sections