General

  • Target

    3588-140-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    1ddef5a3827ffa55d225eef63102cd46

  • SHA1

    cb52d2671fb323e424e498cba2ceb3713a9486e7

  • SHA256

    47d590ccdf5624454250a865565d9c46e02e9d1e2a1e5216b5f4de032bc811e2

  • SHA512

    df1f59d88886851bcdec71768666fb9f75ba6ee11f87e43334ce496d84fe6f2662f7d680c76989ac055eb6d7332c7275756a5becb488278186fde2c93ec530de

  • SSDEEP

    1536:wtMpEvqHEIsanj0ly+G0/nE+vBUFrlY9DZKkAMFFxgfPpAbKuNJtbfpyJI0piOW0:wtMKH7/tDZv2abfmJIewBnFbY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6221660400:AAGb-WADrhdDFxd9kxzjtg3jdDw9-uvNVlM/sendMessage?chat_id=6200392710

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3588-140-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections