Behavioral task
behavioral1
Sample
2764-3-0x0000000000400000-0x000000000044A000-memory.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2764-3-0x0000000000400000-0x000000000044A000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2764-3-0x0000000000400000-0x000000000044A000-memory.dmp
-
Size
296KB
-
MD5
67d02684ae3ce38eff7ffd1ac149bcd6
-
SHA1
925a67574d04612641451c013be423afc5196ec0
-
SHA256
8ef50d4a4e8c598c4420debc88572f116dcac006836d866b4e82034a0fb7a034
-
SHA512
12c85adc5ac5ce990eb290f62ed1e8bc3122680de629771eb503158dfd69f1f8c283c2ef561595018c00bec9674225210c8d6bf3b3a8b7eff78b38e426ccbd59
-
SSDEEP
6144:ZK0jMsk4ciMA4W+hlEyUaq+YaeQB99PvPdHDYvCTkK3Sb4KOhb:ZK0jMsk4ciMA4W+hlEyUaq+YaeQB99PD
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7229061445:AAE3FCrpjv4NkOLREC4l7rC81cO6xC0-XZI/sendMessage?chat_id=1934716051
Signatures
-
Vipkeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2764-3-0x0000000000400000-0x000000000044A000-memory.dmp
Files
-
2764-3-0x0000000000400000-0x000000000044A000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ