Behavioral task
behavioral1
Sample
2804-11-0x0000000140000000-0x0000000140046000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2804-11-0x0000000140000000-0x0000000140046000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2804-11-0x0000000140000000-0x0000000140046000-memory.dmp
-
Size
280KB
-
MD5
2025e99da0b207003a65de8f0884e719
-
SHA1
9a681427d86bca0a0c0c4dee89fb592ecb3d1572
-
SHA256
714c2f6a3c7379cfa4f927341acdaf644f4a3b96cfee83a82d13a1ceda24411d
-
SHA512
9d831ee890375f1412902c55842aad876430eaea19733fe36fc6c11d4e5e1b09d2b0f64c5065553cde8e68afdf705e042e77d6f47c6fd9d97f8803ae41495c30
-
SSDEEP
3072:wqAMYuUphF6EvHIY1nR5XFfMvxwkzPpH4RYib4dkJmiLBYTKBg4i:jFPCb8q
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7470097193:AAH7g9zj8FQx12YOFkn9mZO_1-BTN4b6gKo/sendMessage?chat_id=6155920142
Signatures
-
Vipkeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2804-11-0x0000000140000000-0x0000000140046000-memory.dmp
Files
-
2804-11-0x0000000140000000-0x0000000140046000-memory.dmp.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 263KB - Virtual size: 262KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ