General

  • Target

    1500-70-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    45f2715058dab26b3783b44effd57d9d

  • SHA1

    d6611947272870ce93e238dadf258fb72549a952

  • SHA256

    5e80f7754d61c3e0b0ef79ae30ea1fb71e74dff0de14c4201c4adff8a9c17340

  • SHA512

    8aa7f83a1007d13b0e4756cbd700ff8a6c6193789f62c1516324c10bbcf57beeab02d260333668ee3eb217f16c9e9f616dd7ed71b5e09fe5a77c2514e8d32087

  • SSDEEP

    1536:VtMpEvqHEIsanj0ly+G0/nE+vBUFrlY9DZKkAMFFUmY7N0PRXbKuCG3mbeWpiOWB:VtMKH7/tDZvUb2PFbfPmeQwB

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5900175150:AAEOWcHfBC8E-MpCblgzLaTu6oAl9xGi2Nc/sendMessage?chat_id=6236888590

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1500-70-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections