General

  • Target

    2676-12-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    1e645f357c1aea703cb4cd14d67a175e

  • SHA1

    4f6ade38dad3593e6c590a57e42464f8beac02bb

  • SHA256

    f8176e58d8ce7ff667d801405ded49db6cb23413f2c919789bbbf4f02cf07be6

  • SHA512

    cd92e66947221c2219e29027d1fd38b3d431824ca31dbe92ece68554ff1627a02617c17676fcb55dc4b5c3180bf51b25932af4750c0a1eb0f45b558bcd6297ce

  • SSDEEP

    3072:H/H6A11jF4r6fTmGiHmdPwn4+mjHugruBHwu7m9HXgbJQOGHxso8ZBTVgaiA7bY:TPw//lb5f/b

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2676-12-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections