General

  • Target

    2280-3-0x0000000000090000-0x00000000000DA000-memory.dmp

  • Size

    296KB

  • MD5

    17f5f3a6b21ae903494d47572b00d11c

  • SHA1

    3e232af2265502ff6d53e497373b72ab42298110

  • SHA256

    048a4ae8001f76f6a3574eae66f0478ff19863b74609eca5add1591522fd790e

  • SHA512

    13a6a762b0aafbf885425740f37631805a0fbb75568c9d07141fd361942c02a54ba6d0ff4d0176918aff7d83f2d187a34a78f077e642a2328abfe775a1cf3358

  • SSDEEP

    3072:Byvzck91XFd5gqf9hcaLDXXZ74JHHikdlp5dSX00rMbfTzmiL856YTKBgMiebbY:ddL4MbR8ub

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7204444211:AAHhCv47hRiqEWkkF-hzrMRRq69HpYbFD5Y/sendMessage?chat_id=2065242915

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2280-3-0x0000000000090000-0x00000000000DA000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections