General

  • Target

    1444-199-0x0000000000260000-0x0000000000897000-memory.dmp

  • Size

    6.2MB

  • MD5

    d832611054228761613266dd1c2c906b

  • SHA1

    bc00d4fc957b7317c705674db73ccfee47c337cf

  • SHA256

    860392d69a500b12b8093fdefa636fc3d99b7ab26f498f4b5263c6b71ba436f4

  • SHA512

    59633f6f9999f297040290be1c6cf627a8652457236f1e884518156c62927f2a1577060f5d98ffd96cc198816af88859125a070cba43029739ef71fae930c6b4

  • SSDEEP

    1536:AtMpEvqHEIsanzw6vHWsszWWMFCIV7BjZPLbKuOdkVSGD6piOWB1F0Kcl:AtMKHT6esszW+IV7Lbf5DDswB1FbY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5553654095:AAFY7fGm3A2NSyoJOWhzq_VfL3zRwqCo4Ow/sendMessage?chat_id=6183982484

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1444-199-0x0000000000260000-0x0000000000897000-memory.dmp
    .exe windows x86


    Headers

    Sections