General

  • Target

    872-226-0x0000000000230000-0x00000000007EF000-memory.dmp

  • Size

    5.7MB

  • MD5

    e69f699db05b9fa5664bf54d29d60c65

  • SHA1

    e89413218541b12b30c624e001c41ef5bde5669a

  • SHA256

    0ce1fc4d5bb90951f99cea46251935db3f2a68729bd61a1b64feefefcc0fcd38

  • SHA512

    989df1713473cd7bb0114711fb6d2ef17da0fc53138f82d4340419a0f43a6362505da5bd4f8710930846ddfd36bf75b7e3fee380070f740b738d278c96c06bb0

  • SSDEEP

    1536:ttMpEvqHEIsanzw6vHWsszWWMFCIV7BjZPLbKuOdkVSGD6piOWBOF0Kcl:ttMKHT6esszW+IV7Lbf5DDswBOFbY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5553654095:AAFY7fGm3A2NSyoJOWhzq_VfL3zRwqCo4Ow/sendMessage?chat_id=6183982484

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 872-226-0x0000000000230000-0x00000000007EF000-memory.dmp
    .exe windows x86


    Headers

    Sections