General

  • Target

    1688-28-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    36659fe475c107ac02f0af76fa98c5fa

  • SHA1

    e99b2f100d0c247dcfff86a2df07e525b9d5a7ec

  • SHA256

    3d8a56bdd664b29cb94a189562b6c9362db65bcd5e5d0b1b3b87f9dd699a9f9d

  • SHA512

    166144f2604662775edd94896e185681f419c45016c4e0bff3ecad02614a74b7599e8e53ab750e3c89de786a2a43792758949cd41a647b0c009884f155c71b82

  • SSDEEP

    3072:LyLnzT+lcn52l37S7Q7b7b727Z7X7juXXb4Z91nt4MpHJGqMgS2fbfqP4es0oZYd:zlMLfS2fbGWbb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1688-28-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections