Behavioral task
behavioral1
Sample
2668-35-0x0000000000400000-0x000000000044D000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2668-35-0x0000000000400000-0x000000000044D000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2668-35-0x0000000000400000-0x000000000044D000-memory.dmp
-
Size
308KB
-
MD5
544994eaade1a33929db559093e12ef8
-
SHA1
8d50c9f2a4a22d6e4a3d44f8b7cc2854c6dcaaf9
-
SHA256
e09538ae651c2482670a61d58548763702450b720e4685b4e45f5855047dbdbc
-
SHA512
a9df4d220dd60cfd8fc94b71bc10e3580caa16df594829feedb714786337a4c116a9e9dea2d766fd209e27293ab49ee15e3eb4434c1b1177352cbd1f86f49a74
-
SSDEEP
6144:SK0jMsk4ciMA4W+hlEyUaq+YaeQB99PvPdHDYvC/3vbX//bpfJg:SK0jMsk4ciMA4W+hlEyUaq+YaeQB99PT
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7585192593:AAFE-RkJZiA7gb0SuNTaCaZjBmSC7ArGOxk/sendMessage?chat_id=7469598136
Signatures
-
Vipkeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2668-35-0x0000000000400000-0x000000000044D000-memory.dmp
Files
-
2668-35-0x0000000000400000-0x000000000044D000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 263KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ