General

  • Target

    1092-18-0x0000000000400000-0x000000000044A000-memory.dmp

  • Size

    296KB

  • MD5

    d89008aea6409ed4846cb54cb57f2eff

  • SHA1

    aa8d0305d187296fb1306549246be0966907181e

  • SHA256

    c867c184f63c85955c909820b28d7b5d05e656a10c9ddf5f280a4d91a298e09e

  • SHA512

    536f43d9c8a6a3f78f3285eef2fb8cb65b74ca7abd86cea6cae6c415ee54b5360227136d2bb5a26e3010de0cb78ca1feefba8fdb670b071d725d63ed938005c0

  • SSDEEP

    3072:ybQzJLCLuwO9Dbn+O7+TXPwG+ln9leNPJhhHJzVlJwbfZssoUUYTVgliZbbY:9G3NPJd+b/hb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1092-18-0x0000000000400000-0x000000000044A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections