General

  • Target

    2804-11-0x0000000140000000-0x0000000140046000-memory.dmp

  • Size

    280KB

  • MD5

    2025e99da0b207003a65de8f0884e719

  • SHA1

    9a681427d86bca0a0c0c4dee89fb592ecb3d1572

  • SHA256

    714c2f6a3c7379cfa4f927341acdaf644f4a3b96cfee83a82d13a1ceda24411d

  • SHA512

    9d831ee890375f1412902c55842aad876430eaea19733fe36fc6c11d4e5e1b09d2b0f64c5065553cde8e68afdf705e042e77d6f47c6fd9d97f8803ae41495c30

  • SSDEEP

    3072:wqAMYuUphF6EvHIY1nR5XFfMvxwkzPpH4RYib4dkJmiLBYTKBg4i:jFPCb8q

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7470097193:AAH7g9zj8FQx12YOFkn9mZO_1-BTN4b6gKo/sendMessage?chat_id=6155920142

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2804-11-0x0000000140000000-0x0000000140046000-memory.dmp
    .exe windows:4 windows x64 arch:x64


    Headers

    Sections