General

  • Target

    4408-63-0x00000000004B0000-0x00000000004F8000-memory.dmp

  • Size

    288KB

  • MD5

    ea27f8714066d8892b0ec69721ccdf67

  • SHA1

    b62292df1a01896fd6e9c64c96cec5d347d4cb28

  • SHA256

    d7689255f2f80187ecb35fde7fa92219b10a62a43d87b3b81e16f60c18d27d62

  • SHA512

    6d007ce84256a0c092dd685475fe80592286a8b810b29b7039fa6ff37e43fcd13477caf54c2d07977cf0f7d4dbd3fde60efa9ad35f3603f54dc8122485202919

  • SSDEEP

    3072:wpdjv4WNr0HTfNUWwB0XpNTjZgAOQ5pH1/Up6ebfcsoqXYTVgHikbbY:d3XibPbb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4408-63-0x00000000004B0000-0x00000000004F8000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections