General

  • Target

    2648-36-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    5f6f42c35beed1d265ec03ff7824a4c8

  • SHA1

    71d498986951578c9108fd8c83d9701c90f7b4e5

  • SHA256

    841eec4c78f77cac63dcb7ca0f2509693ad75eacf8c2b694b6fc7765ee81c465

  • SHA512

    5b02dea8405f1eafaaedbb1a0d993123d25a71a9811f10a5cf141fe28af6d0e112b5ceaa59712bc6adcac1faaae06776afa1cea2a7fb88e6b381f65873fdec77

  • SSDEEP

    3072:nw+blXHC7k7WZuXRAnxXFrXIV+gEN4PSL66U10dKQnVb2QfDs0qZY/Vgai/bbY:CQWrZ4P3y1nVb2ndb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2648-36-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections