General

  • Target

    2096-3-0x0000000000400000-0x000000000044A000-memory.dmp

  • Size

    296KB

  • MD5

    3b1370eb2da2f5078108e24c8efa074e

  • SHA1

    24ab436dfcf1c7621535f11685d30605168d450f

  • SHA256

    4594b859823ec2b10f2f762a801085f89141245eccbd9e97468d93f90f26fa1b

  • SHA512

    5e8844c1b0a78a585a122b5842e51baf47d4c6d608ebbcf9c0d23d11b37b6e0cfb0f7935d990c3f42bba472e3301fcf1d60f4081d18a6e5e7b51c02e2a05b9cb

  • SSDEEP

    3072:Ox8DdGtkFp8nLDsMr8adXWvElAgxTbpHOcJvx66Mbf/jJPmdSYTKBg4i9bbY:aP7JENbgb

Malware Config

Extracted

Family

vipkeylogger

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2096-3-0x0000000000400000-0x000000000044A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections