General

  • Target

    2844-42-0x0000000000490000-0x00000000004D8000-memory.dmp

  • Size

    288KB

  • MD5

    979a02dc81bf71cb5571b17d3833df1c

  • SHA1

    e6c7f71a9e332f036baa4f4f8162dd0b5be0d897

  • SHA256

    dceecdf4888aa60a6b1a624fa035fba8397bd503f1829be5675247d40b009f0e

  • SHA512

    848c244e78f45420d49f86731b24de39d995d07916ffcabef74fdcf4deb8270df3628cadb1c199c4f0ec5704b256cea180fa98c7b7c165f0a5d29a2ab9ee1db9

  • SSDEEP

    6144:PK0jMsk4ciMA4W+hlEyUaq+YaeQB99PvPdHDYvCEMb0IzBb:PK0jMsk4ciMA4W+hlEyUaq+YaeQB99PF

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7807279596:AAEZM1QwkCh738-y0Qmnc3ubaoLMl6bUCVw/sendMessage?chat_id=7267131103

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2844-42-0x0000000000490000-0x00000000004D8000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections