General

  • Target

    1580-113-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    1f3a089c73786af4bd80a6646a599fa1

  • SHA1

    3acff73fc5b22151f45bccb267990ed53ce9a181

  • SHA256

    5803fc952fba55fe82c6131d70f87da02a30d80d085920aebfec8715d6703c0e

  • SHA512

    b36cca401a0250013781af57a44dfd17e033b3fee0f68326e905a8ae1a5461f1023afaaa36fe4737682c9b468756547e790ec4b2353c69a856b5fcbf7adf2b64

  • SSDEEP

    3072:2Y5pbEci0NX4Pi4iYGYUbfvpMfBqrFbY:2BF749bHdRb

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1580-113-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections