General

  • Target

    2728-22-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    bd332eb86b34be04868e28aa94ec9742

  • SHA1

    4d769f08c33fc7c4a9d81f8750383e1ab295b47f

  • SHA256

    766bbbc79210dd895d56fa2452e932b31edebc3ce916734479b07ac2c865c78d

  • SHA512

    09a8bbb4b86f53fb0d3539cfed7644379dec3cb3dc075de6838cca3f86613b97943adc9a6e8d2cf0e22c93e1a64f621bd2516777f62ece9bc83430904b800e86

  • SSDEEP

    3072:tAZKzj+h4u3wANnbaG8lLm8y7vrXAlb0mxzvzs5ih2fYtGgCbuc6sj/CB/Vgaizi:evYqBUGPbvptb

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7323823089:AAFBRsTW94zIpSoDS8yfGsotlQLqF2I6TU0/sendMessage?chat_id=5013849544

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2728-22-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections