General

  • Target

    3044-3-0x0000000000400000-0x000000000044A000-memory.dmp

  • Size

    296KB

  • MD5

    eecb1289459d2fe6d3e84793c7b90e56

  • SHA1

    7c18af52453c04394b44b26a1c8ac839da1294ac

  • SHA256

    fa01afeaf4c80930e4342722d67f6f8da48a47ed36cdfd583a078cd88554a0ca

  • SHA512

    cebd84f50deae6ce340f52cf2c2c192a29ce04c97d24fae69b903f18f75187b472dacac10db988fd0ef41824271c6da018a59680d2fcf409aa0deb64a2f96b74

  • SSDEEP

    6144:4K0jMsk4ciMA4W+hlEyUaq+YaeQB99PvPdHDYvCmbyDPb:4K0jMsk4ciMA4W+hlEyUaq+YaeQB99PR

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot8090541500:AAHv-MABtUYDId-S0JAxJ4ymb-71UGsOOaQ/sendMessage?chat_id=7009913093

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3044-3-0x0000000000400000-0x000000000044A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections