General

  • Target

    2620-32-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    c4421c1e6f66a3e5532d3debcfd70767

  • SHA1

    a5dbbbc6c27d0fab57c1d4813c3ac65293bd1b1b

  • SHA256

    5ec10831592f7ed541466707eaec6a101e73e9cdf8744257751a074d579da5bc

  • SHA512

    a1e921ed3168a8dda81acba3abdb09e35d147b786b9a7edaf028e2eabbc7ef6843e16ba1e6bca327a840968fa8c860ac983d7d1fe434ec98e3f0d4090da6b765

  • SSDEEP

    3072:KrHj3Bxl2pyY8rXuSmjn2L86riXriCd48+UxHwMAwonf045byPELtso1ZYTVgait:nEUtBon5baELJub

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2620-32-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections