General

  • Target

    280-571-0x0000000000480000-0x00000000004C8000-memory.dmp

  • Size

    288KB

  • MD5

    9fe53e45434d4b997f4f0dac6aa62436

  • SHA1

    855a2d6b19a33acb9cbacad5d062df9e18413086

  • SHA256

    6e559de0d3a793c0d33566bbf8cb35c203bcb457556a3043da4e5940db58fcbe

  • SHA512

    9c0a3a3971b1887e6a35a7ea6c70f2d0424d654169ca9f289d2ff4ff06de38ecb52493ab058ec45e62aa85195a2dd01a10b51e9f32ee66e5b1495a7ce12d4370

  • SSDEEP

    3072:/3A58euvblfzWZnUhXTFd6sk78SLaYU10dKQnVb2QfDs0kZY/VgainbbY:A8Fy1nVb2pVb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 280-571-0x0000000000480000-0x00000000004C8000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections