General

  • Target

    2560-14-0x0000000000090000-0x00000000000D8000-memory.dmp

  • Size

    288KB

  • MD5

    cd9b8a6489c55a88ecdf002c3731c17c

  • SHA1

    7e91fca27acf825a42177c712f0a6eb6763de2fa

  • SHA256

    40e5146365fd9db2c14b8b97890a9dd06222561ce567732ddaf3d0ada2921ea4

  • SHA512

    8eca1ded3b3222b3216413138f5ac36bdedbe7f6b5d4db9bf23db019a95f67956f2f6f401403d0ccefebf672f12eeb23ed2ff35e9795d941f295898fb4ba1150

  • SSDEEP

    3072:7WzITA/lFORPHfmor/X/agkfIF4ASLVt+aPWXQ2bIwFTsoXUY/Vg4iKbbY:iJA34f2bhRRb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2560-14-0x0000000000090000-0x00000000000D8000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections