General

  • Target

    2836-6-0x0000000000400000-0x000000000044A000-memory.dmp

  • Size

    296KB

  • MD5

    d5e969b941a58f5abad8d39b75812975

  • SHA1

    65f3e107570a454d07b47a7e1e0266ff8c2954a2

  • SHA256

    573789a78d303547951a7e210f6ad314450621fe619330d160e6481f2f29d0d9

  • SHA512

    db008ef4db0423d9ca54f1c1cbac523ef0c148162bbe893fb083f586efb07aed448ae289ec5ed6503c1071254ab6139b767dba3d08e62c659366a6c829ceec6c

  • SSDEEP

    3072:4hHdR9Aes9+K20VnsHmEomJhZUmQWO1TgFHgwNBMdHklO5LHbJh7miL856BTKBgS:bX9+KBVn9XV2OZbHt8Yb

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7204444211:AAHhCv47hRiqEWkkF-hzrMRRq69HpYbFD5Y/sendMessage?chat_id=2065242915

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2836-6-0x0000000000400000-0x000000000044A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections