General

  • Target

    944-36-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    73d0341522e8e68f8406f8b65d13e7b4

  • SHA1

    76bc3ec098fe51b36261f79b5cd273746d613b07

  • SHA256

    59494279253603e182bbf72ef37d7c31310c6826c3545b3959352ce825e66da4

  • SHA512

    b05a1fb195166d13d3868ae990522c6f7237af195451ec889e8eb337cefb9ac3f57938e72113ac3b29cb4a486ff167b872d78622c7566c92eeba4fbf8ecd26c9

  • SSDEEP

    3072:OaXETsdsFfluhrdcZXdfvuWUF/z2SLjXU10dKQnVb2QfDs0xZY/VgaiHbbY:ky2ry1nVb2klb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 944-36-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections