General

  • Target

    2696-20-0x0000000000400000-0x000000000044A000-memory.dmp

  • Size

    296KB

  • MD5

    0aa1e0152285be098500cb2fb598864d

  • SHA1

    d22948144b97e4d50d67bb149fe43bb084ee6738

  • SHA256

    470ee68af393d57e69d787ef60ff17f1e30c670ce8fd68bf33cc81e9d4fc16b6

  • SHA512

    1af505826a2afb75fa1db5484391ab6bc6dcd5a5e17b491d35da3601b2c8fa8c356eb07265a8263dafb87d67ac6fb10ad7745f0ae793dc58716d9ae77e9dff2a

  • SSDEEP

    3072:J45Tjo+DhxX+u+uD/iuwXtl+0j2URlYwEpH97buKfozJ3bfIpvhAk2EmdIYTKBgB:KGETbh8pb6hb

Malware Config

Extracted

Family

vipkeylogger

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2696-20-0x0000000000400000-0x000000000044A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections