General

  • Target

    2360-21-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    b7a5ec720d62835d7d5e83042a0d4b91

  • SHA1

    a219a2afff88797c7928e100c8dffe367cd62e7a

  • SHA256

    839746f8409e124da5833f0b81250d0963db576eb29e81b2d760a2c7da4b1a1b

  • SHA512

    bb58843cb081458452d9f2c0aec753910fd647f1f86e2fd430e9235e88799bcb93c733d39585554c6e204539a9faaaff8cdebf7362c421be1e7db9acfe61f519

  • SSDEEP

    3072:baXETsdsFfluhrdcZXdfvuWUF/z2SLjXU10dKQnVb2QfDs0xZY/VgaiHbbY:jy2ry1nVb2klb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2360-21-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections