General

  • Target

    2128-11-0x0000000000400000-0x000000000044A000-memory.dmp

  • Size

    296KB

  • MD5

    915f8a0e2ef3c2af4f2e89f3eb6aeb23

  • SHA1

    08e74474dfc26698f43526c2200dc9dceda1771c

  • SHA256

    01629c577ad5d971e7954e11f0dd45980b6863bda4409a4c20b49811bc806194

  • SHA512

    f0b4e8d5959da06e46242d683db11cdca2401c4ceb2fe2e15cb8e4defdd5b63d39399788da8b22c413f5ea090756213b856e81cd80f21daec8a99ae118ee20ad

  • SSDEEP

    3072:a0Jj1dVyF5cNPPHPuctdXY0Tuhd6oNkpThHD73lZK7wvEAbfzRl7tbmdaYTKBg4j:HTdb2Abdl7qb

Malware Config

Extracted

Family

vipkeylogger

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2128-11-0x0000000000400000-0x000000000044A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections