General

  • Target

    1968-15-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    561955287f2c679d7e4f82f04066ed36

  • SHA1

    b6db460ab517d71dcd7ac4dfe11491c92d204c26

  • SHA256

    cdda7b9e7ff5e53297a93c64e9d6cbaa428ae0fcace86ff44e68a5319602b4a7

  • SHA512

    44b7932597cfbbe02d3552fd86c14379f1148869dfc1134c9069b99c22dabf12abd805e58180c6bcbf9098b4eb8365480cd420bf88a4df35e9a3d39a76ebff6f

  • SSDEEP

    3072:/A+blXHC7k7WZuXRAnxXFrXIV+gEN4PSL66U10dKQnVb2QfDs0DSZY/Vgai/bbY:KQWrZ4P3y1nVb2Tdb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1968-15-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections