General

  • Target

    2680-8-0x0000000000950000-0x000000000099E000-memory.dmp

  • Size

    312KB

  • MD5

    0a7a8f73e3084c1f81226e3cae7002ce

  • SHA1

    feb8de8e91bef9205ac2104760f27fa4490de3ee

  • SHA256

    433da7354531fd850519cf6f4666fd37b81e498bae6e2602d307238c24cab1e5

  • SHA512

    ceb7437fe77cf3669bfc788cf3592617425d86af2afb666723c14dd7748789882465dc61bccb853fa8e9f3f49681e9b51f6b0c2d0af42aac671dce9e5f325039

  • SSDEEP

    6144:BRi8Rh5lXlKi0e2IgcEskGQiI4o+mk1GdJ3frFcRC7fUbrUhb:BRi8Rh5lXlKi0e2IgcEskGQiI4o+mk1u

Malware Config

Extracted

Family

vipkeylogger

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2680-8-0x0000000000950000-0x000000000099E000-memory.dmp
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections