General

  • Target

    1476-137-0x0000000022FA0000-0x0000000022FEE000-memory.dmp

  • Size

    312KB

  • MD5

    3ecabc1e833ea90eb020bd8b86e1329c

  • SHA1

    5ee9223971653dfb0dba472e5baabcd29f80461d

  • SHA256

    f898fd787604abc2f8b9c1c8171e4337a5d2bfe59ba9cddad44778dd822403c9

  • SHA512

    59eb5150410149faa2dedb560ab6425e15d0e24fbcb345e409f6313214e6050d4c403960be9f7e8d58e1c91bda872c83c9a18614e700d8d82febf3a8fbdf7d43

  • SSDEEP

    6144:PsxN26GvJc757o5BjF/PsCUtBB/Rr9FxXGCsyHeoEkaN7L7T70bYOIlb:3vJc757o5BjF/PsCUtBB/Rr9FxXGCsyI

Malware Config

Extracted

Family

vipkeylogger

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1476-137-0x0000000022FA0000-0x0000000022FEE000-memory.dmp
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections