General

  • Target

    1932-21-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    158fba361acf10d01302c4d8f4a0212d

  • SHA1

    de0c3fa12aad907e60bd90bc87c90f2865d8384f

  • SHA256

    1dce1575daf6776b8c509897d19c9225f4e037f74a2b948d1238d564d2bf8e14

  • SHA512

    6f13eb549175c114e1cdef533944a5c77b6bf968304788107cc76ad5f4cbb37ab95fd399c464db475f03ac521301cc017f75e288aeb12abf9ce85386b1b14c92

  • SSDEEP

    3072:PBS/rmeryu6p+W7UrpXNkxstad2lSLKwU10dKQnVb2QfDs0EZY/VgaiXbbY:07l9y1nVb2JVb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1932-21-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections