Behavioral task
behavioral1
Sample
2844-42-0x0000000000490000-0x00000000004D8000-memory.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2844-42-0x0000000000490000-0x00000000004D8000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2844-42-0x0000000000490000-0x00000000004D8000-memory.dmp
-
Size
288KB
-
MD5
979a02dc81bf71cb5571b17d3833df1c
-
SHA1
e6c7f71a9e332f036baa4f4f8162dd0b5be0d897
-
SHA256
dceecdf4888aa60a6b1a624fa035fba8397bd503f1829be5675247d40b009f0e
-
SHA512
848c244e78f45420d49f86731b24de39d995d07916ffcabef74fdcf4deb8270df3628cadb1c199c4f0ec5704b256cea180fa98c7b7c165f0a5d29a2ab9ee1db9
-
SSDEEP
6144:PK0jMsk4ciMA4W+hlEyUaq+YaeQB99PvPdHDYvCEMb0IzBb:PK0jMsk4ciMA4W+hlEyUaq+YaeQB99PF
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7807279596:AAEZM1QwkCh738-y0Qmnc3ubaoLMl6bUCVw/sendMessage?chat_id=7267131103
Signatures
-
Vipkeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2844-42-0x0000000000490000-0x00000000004D8000-memory.dmp
Files
-
2844-42-0x0000000000490000-0x00000000004D8000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 263KB - Virtual size: 262KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ