General

  • Target

    1740-1090-0x0000000000E40000-0x0000000000E86000-memory.dmp

  • Size

    280KB

  • MD5

    589ccc8d7db6b1fa0fb4346ab439f4b0

  • SHA1

    7b6c55d4cefdc7138b7d670103912d0b92927c23

  • SHA256

    0625dc5404fb9bb97d46da6a3abd0bc0f4e6d608a9b99d872f85e50a5baf58ba

  • SHA512

    f21860199fb81656fc935240772763859b85c3841a3cd8234d914d0202cf9b717875f6b20c10a4f8a573a86330dbcdfe2bbbd51f53cae6c4da12d7dff9e86a9f

  • SSDEEP

    3072:W+Cjrbs4EmTL7U7IJjB+XOHuy3pRxHzZfCgbv1X2Es0VZYTVgaiMpbY:ARKgbdXLyb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1740-1090-0x0000000000E40000-0x0000000000E86000-memory.dmp
    .exe windows:4 windows x64 arch:x64


    Headers

    Sections