General

  • Target

    2132-1-0x0000000002100000-0x0000000002150000-memory.dmp

  • Size

    320KB

  • MD5

    7f14bf0c5bda8796a5da98ead596a80c

  • SHA1

    eb346c54f4f61cf84866afef2ef26f09db0a0724

  • SHA256

    90d78a9a15f1a023ccef42d3325b96aca55d65da9087faf9813b89bb852f1b26

  • SHA512

    7d1f4b0021c0a36efa8d5ce86ccfee7c418b5fa2d62a797fc1d91aee3a930fa5792a1145a2cbf92a908caf553930e535e4f7cf7037134385e78c786cc547f09d

  • SSDEEP

    6144:aZz4kAWESIdSyuJp0G2q2yVFT/GaQKR+iBurqbOzpQcprXC3UiUkOSiyM1DVe0nE:84kAWESIdSyuJp0G2q2yVFT/GaQKR+if

Malware Config

Extracted

Family

vipkeylogger

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2132-1-0x0000000002100000-0x0000000002150000-memory.dmp
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections