General

  • Target

    2176-3-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    463ba3ba87a35344202c49e8e6954dc9

  • SHA1

    2351615938a98219843945368ae060b939e361f2

  • SHA256

    4196e72e846bb97cbf5857f2b57048b2213d854f2c9e34f842d44c94b111f0c0

  • SHA512

    e452e5f3f66e9dc9db8f0fbb6db3b592f424d4a66ae10d9a2c8c9a13fe6e8468a3ab81a19e4c8a58c90d18e60efec5df6f55d613915c2e5760a47f8708ba1333

  • SSDEEP

    3072:IMS/rmeryu6p+W7Ur3Xn3BwdIo8azwioSL2Ae1CbbITDV4s06XY/VgHiGbbY:U0oMewbbyRb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2176-3-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections