General

  • Target

    332-44-0x0000000000430000-0x0000000000478000-memory.dmp

  • Size

    288KB

  • MD5

    21b4556e86d8b517a62d732c7d4545fc

  • SHA1

    f79189fcfa2c34f9924ece5e603023824fd5894b

  • SHA256

    b93314cdb6c3d662b8d0371c5ac784eec3658c5ebdbe6b6ec0ced175bf6f988f

  • SHA512

    4b88def0f0bacee0c21913594868ea40209233cf4d3d32c039af27ab04d556cf6f203f60946abcab512a8eb39d13cb51261370f51232c3edf0fae43c29c3ade4

  • SSDEEP

    3072:37aT7BpxrdPNuuaZqwwXNl+0j2cDlYwUpH97blNp/5/5FbfHs7T4Ls0bXYTVgHir:5YUTblNp/Nzb0n4Tb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 332-44-0x0000000000430000-0x0000000000478000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections