General

  • Target

    2164-63-0x0000000000880000-0x00000000008CA000-memory.dmp

  • Size

    296KB

  • MD5

    e1178103ac86d3a7f77436f6f47d1770

  • SHA1

    3341504635c3142c0fadf501a662f479447f8197

  • SHA256

    8577ae046129cf263543dcdc30af7d730af1179ba30bc061a80a2751a7a1e1cd

  • SHA512

    0d1fbc8c9d83c39e274ae8d902a379c81e393703d5dfad05abaed3f4a0d2e4f5d4e4e137a89ec4209c230ed70a7f8cf1324641ffcd18b2cdaf9c53232ffb979f

  • SSDEEP

    3072:w1hR+KN3L771uy4aqnfXmKQpD7tNDV99V2A0yNN5LZvVl3NT/1m8897fxMC/0GnY:JeG5BFIbExb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2164-63-0x0000000000880000-0x00000000008CA000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections