Behavioral task
behavioral1
Sample
2628-25-0x0000000000400000-0x0000000000448000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2628-25-0x0000000000400000-0x0000000000448000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2628-25-0x0000000000400000-0x0000000000448000-memory.dmp
-
Size
288KB
-
MD5
f4b67b6639997f9d7e3209e1d02319d7
-
SHA1
0d6efead741e2e21d89dc6dc7392c7bf1b45b0ba
-
SHA256
e3fbda025b1f9ec95fd83285b568c154b6e9605f774fd11ea843b5a98ea4f6d8
-
SHA512
2e4cc436a03efb17689c06ac30cc720c9a8d53180fe3fe955ed984bff4bef659ae140257b903181f185be4cd167657b289cd3ffc2df55238fec79b29c59ad60e
-
SSDEEP
3072:qi8zGMcOGgRcO+X+iS9ScSjSWSYS3VXmNqpxKdks/3pH4nSLD2I07bf5todmiLYK:7VtVud87ehnDo3K6DO7bT+
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7514635603:AAFnm0liZNrDoyZysE6fl63uCfuqFuaKPug/sendMessage?chat_id=5116181161
Signatures
-
Vipkeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2628-25-0x0000000000400000-0x0000000000448000-memory.dmp
Files
-
2628-25-0x0000000000400000-0x0000000000448000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 263KB - Virtual size: 262KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ