General

  • Target

    2820-13-0x0000000000400000-0x000000000044A000-memory.dmp

  • Size

    296KB

  • MD5

    390f49756d4316104dd39491d2a7d1d5

  • SHA1

    87eecef616d5a85120e72967f98a4309bf33bfdf

  • SHA256

    c3c54ad89053de4464b5f9cdc77de12972404dfebfb0828e543c925ed2c03018

  • SHA512

    c0a4733b74728103b245011dbdf8c86357e1253ffd6fd252e59ab3b1ff53823f8f45bf55775cf388c957e2bfad495e4727d2d0f0af781935d42f4f0a8bf486bb

  • SSDEEP

    3072:7bQzJLCLuwO9Dbn+O7+TXPwG+ln9leNPJhhHJzVlJwbfZssoUUYTVgliZbbY:eG3NPJd+b/hb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2820-13-0x0000000000400000-0x000000000044A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections