Behavioral task
behavioral1
Sample
3044-3-0x0000000000400000-0x000000000044A000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3044-3-0x0000000000400000-0x000000000044A000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
3044-3-0x0000000000400000-0x000000000044A000-memory.dmp
-
Size
296KB
-
MD5
eecb1289459d2fe6d3e84793c7b90e56
-
SHA1
7c18af52453c04394b44b26a1c8ac839da1294ac
-
SHA256
fa01afeaf4c80930e4342722d67f6f8da48a47ed36cdfd583a078cd88554a0ca
-
SHA512
cebd84f50deae6ce340f52cf2c2c192a29ce04c97d24fae69b903f18f75187b472dacac10db988fd0ef41824271c6da018a59680d2fcf409aa0deb64a2f96b74
-
SSDEEP
6144:4K0jMsk4ciMA4W+hlEyUaq+YaeQB99PvPdHDYvCmbyDPb:4K0jMsk4ciMA4W+hlEyUaq+YaeQB99PR
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot8090541500:AAHv-MABtUYDId-S0JAxJ4ymb-71UGsOOaQ/sendMessage?chat_id=7009913093
Signatures
-
Vipkeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3044-3-0x0000000000400000-0x000000000044A000-memory.dmp
Files
-
3044-3-0x0000000000400000-0x000000000044A000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 267KB - Virtual size: 267KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ