General

  • Target

    1180-9-0x0000000140000000-0x0000000140046000-memory.dmp

  • Size

    280KB

  • MD5

    aea14c7c90670e4e52382457b1790280

  • SHA1

    c1389340b9bf95d49514aa8ca8bcfbd21e1fce77

  • SHA256

    96900faf2171d476767e27dbcbdbde836e3daad446aec953770eb8f15cbbeb19

  • SHA512

    9cc3db5fdebd1a77971d76041b87070efd1918ac043749fc700a2f6e2aa4326a8c9e882c5ee2cc3833381aeaae22f4cc3c6bc74151320cdee87595596b8a7e90

  • SSDEEP

    3072:STsDJ/xMyGYPUXqa7pGhXuFJvUi79IUxH3jyYbvwsonhmUYTVg4i8pbY:VXUdDbp1b

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1180-9-0x0000000140000000-0x0000000140046000-memory.dmp
    .exe windows:4 windows x64 arch:x64


    Headers

    Sections