General

  • Target

    2428-45-0x0000000000E70000-0x0000000000EB8000-memory.dmp

  • Size

    288KB

  • MD5

    488ba4a8105d6184113950cd2d6be90b

  • SHA1

    6a73149daa994cbdf53a0091531e7307d7b0cdc4

  • SHA256

    5de4edb9ce439dc4cb7d13ea44061350b4fe347b7ea9a2afb79681df68ee913a

  • SHA512

    a33b45cf3238a0d2c7dd038d0f510d297f4e5959d209fd67aad77ca9cc10ffb6108bb2d70eb4e0e699fc6b1baa44647d2a33bdd27538c382b4b8d37023658db1

  • SSDEEP

    3072:wXZTbLsggkT9TjN2nB08QXd8nBhFhwCpH9odZbfE/Ih4s0xXYTVgHiUbbY:M5vJCSbs/IuLb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2428-45-0x0000000000E70000-0x0000000000EB8000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections