General

  • Target

    1768-209-0x00000000004F0000-0x0000000000BE4000-memory.dmp

  • Size

    7.0MB

  • MD5

    fbf1221404290de3af48417f60aa63ea

  • SHA1

    2f6c50743d6ddfdde12280430c44ac0c2efff011

  • SHA256

    dcbccddca1ef124be7446b68a2093cecb5742754740ee16904100636f3393e2e

  • SHA512

    9470a42f77a2267ecdb757e2debe59792f3d928f27c075fa2f6e90f588561a59ba3fd1e21e43fb4ad12b4e535c80b7a57ae66640557f5f4790c322976189fb54

  • SSDEEP

    1536:5tMpEvqHEIsanzw6vHWsszWWMFCIV7BjZPLbKuOdkVSGD6piOWBSF0Kcl:5tMKHT6esszW+IV7Lbf5DDswBSFbY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5553654095:AAFY7fGm3A2NSyoJOWhzq_VfL3zRwqCo4Ow/sendMessage?chat_id=6183982484

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1768-209-0x00000000004F0000-0x0000000000BE4000-memory.dmp
    .exe windows x86


    Headers

    Sections