Behavioral task
behavioral1
Sample
2628-31-0x0000000000400000-0x0000000000448000-memory.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2628-31-0x0000000000400000-0x0000000000448000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
2628-31-0x0000000000400000-0x0000000000448000-memory.dmp
-
Size
288KB
-
MD5
719b6e97244820e7c4b768df560082d3
-
SHA1
afbcb35ade65d989342962f7442e17fb52640498
-
SHA256
b04007f70bf423ff167cd01dcc3fb181bc831093dca18cf86faeb13b3784e1d5
-
SHA512
2b1f11b679e5ef9d2c4064d271845e83af5f03f558410cc9a8ccde2d0f6df219df50738eef9584cc3fcc4816b619841c56de5e2182fcbbd150a1d6a193e75fc7
-
SSDEEP
3072:Li8zGMcOGgRcO+X+iS9ScSjSWSYS3VXmNqpxKdks/3pH4nSLD2I07bf5todmiLYM:mVtVud87ehnDo3K6DO7bT+ab
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7514635603:AAFnm0liZNrDoyZysE6fl63uCfuqFuaKPug/sendMessage?chat_id=5116181161
Signatures
-
Vipkeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2628-31-0x0000000000400000-0x0000000000448000-memory.dmp
Files
-
2628-31-0x0000000000400000-0x0000000000448000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 263KB - Virtual size: 262KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ