General

  • Target

    2596-30-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    5f0ba0edb4a20907bd7f23308b450e60

  • SHA1

    3217be6c70ebbc5e66d4153a9ee797bf25a07a15

  • SHA256

    741a141fb1be4c165169f7e0f808065d2310277b7b7ac11156096e557b08fdb0

  • SHA512

    2325dcf9f9299ea575cf8e828ab0298e3d6ceda1ad019d99de411d67788e47ce24d6a732ba147bd060f4cf1a95473736143da06774e31cd91bbb2d4c6751d8f0

  • SSDEEP

    3072:LmOzLtdmQiLY5xB46i0Xb0RmrmRe1LIpHut5O50zQJBbfU2GJlos0YXYTVgHixb0:jIPBb5GvlUb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2596-30-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections