General

  • Target

    2056-20-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    205df8ba2fdcc354ec887d97c0b39379

  • SHA1

    bd1286cea495b3043aa09fee9f8cebe9a15c9b0c

  • SHA256

    85b72f5e4083cf4eef2a84306da975e8e8bfe04768c551013861f06445fc1cbf

  • SHA512

    fa58e7120ade447d317480ccd4aa30acfa8d612ab674c2a8666c906f6ee41691e4d2afd6bb9013687a2a0f4411b08c4b042877f79979ce2c4bef8f43acbe4e5d

  • SSDEEP

    3072:tBS/rmeryu6p+W7UrpXNkxstad2lSLKwU10dKQnVb2QfDs0OZY/VgaiXbbY:K7l9y1nVb2zVb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2056-20-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections