General

  • Target

    2668-35-0x0000000000400000-0x000000000044D000-memory.dmp

  • Size

    308KB

  • MD5

    544994eaade1a33929db559093e12ef8

  • SHA1

    8d50c9f2a4a22d6e4a3d44f8b7cc2854c6dcaaf9

  • SHA256

    e09538ae651c2482670a61d58548763702450b720e4685b4e45f5855047dbdbc

  • SHA512

    a9df4d220dd60cfd8fc94b71bc10e3580caa16df594829feedb714786337a4c116a9e9dea2d766fd209e27293ab49ee15e3eb4434c1b1177352cbd1f86f49a74

  • SSDEEP

    6144:SK0jMsk4ciMA4W+hlEyUaq+YaeQB99PvPdHDYvC/3vbX//bpfJg:SK0jMsk4ciMA4W+hlEyUaq+YaeQB99PT

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7585192593:AAFE-RkJZiA7gb0SuNTaCaZjBmSC7ArGOxk/sendMessage?chat_id=7469598136

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2668-35-0x0000000000400000-0x000000000044D000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections