General

  • Target

    2764-3-0x0000000000400000-0x000000000044A000-memory.dmp

  • Size

    296KB

  • MD5

    67d02684ae3ce38eff7ffd1ac149bcd6

  • SHA1

    925a67574d04612641451c013be423afc5196ec0

  • SHA256

    8ef50d4a4e8c598c4420debc88572f116dcac006836d866b4e82034a0fb7a034

  • SHA512

    12c85adc5ac5ce990eb290f62ed1e8bc3122680de629771eb503158dfd69f1f8c283c2ef561595018c00bec9674225210c8d6bf3b3a8b7eff78b38e426ccbd59

  • SSDEEP

    6144:ZK0jMsk4ciMA4W+hlEyUaq+YaeQB99PvPdHDYvCTkK3Sb4KOhb:ZK0jMsk4ciMA4W+hlEyUaq+YaeQB99PD

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7229061445:AAE3FCrpjv4NkOLREC4l7rC81cO6xC0-XZI/sendMessage?chat_id=1934716051

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2764-3-0x0000000000400000-0x000000000044A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections