General

  • Target

    1864-215-0x0000000000240000-0x0000000000824000-memory.dmp

  • Size

    5.9MB

  • MD5

    97be263faff526b5f3159a2e3a614495

  • SHA1

    8f319a035f312f17a5655da51ff68bcc1f8305f5

  • SHA256

    a5dbd174bb2a92144922ee09071588f5d0bf55ad18f3303b94b25c0bc2a2249d

  • SHA512

    d63a7a1292e04d120a3fe812b735efa903974b8018c9b6aa197b74c32942a8d7d33058b3e2cc3d099ba6bcb8e5e99a723306844949176f53db97ecbb78b4b8f7

  • SSDEEP

    1536:ptMpEvqHEIsanWBk56oKdQXIMFLA1Vyo9I2R1bdbSzDsypiOWBSF0Kcl:ptMKH9voKdQXVA18ohR1bpSMUwBSFbY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1628683147:AAHrCQLe6jCIHNtCV4vrDvX8lcHsoz9HNAA/sendMessage?chat_id=917280008

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1864-215-0x0000000000240000-0x0000000000824000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections