_.pdb
Behavioral task
behavioral1
Sample
2120-17-0x0000000000380000-0x00000000003DE000-memory.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2120-17-0x0000000000380000-0x00000000003DE000-memory.dll
Resource
win10v2004-20241007-en
General
-
Target
2120-17-0x0000000000380000-0x00000000003DE000-memory.dmp
-
Size
376KB
-
MD5
cbebf8b4a590388fc383e28bdc395804
-
SHA1
1b6abe0c61e215a827c1a69dcc53a4b9bec00a90
-
SHA256
fb304d323e9311c16ce6f1da503296594fb0cb2cbe010ad64babe8be6fd7ae48
-
SHA512
29b9b5cbb71ebd81296e72d2f86bfb10a471155ea178335779646bf16b41dcde5d86275f892402c07d2e54247c0f253523bfa030c7477f4149f980e71ef46285
-
SSDEEP
6144:1lXJWhppC7v1Vl//qCt7tjLjHB7v5uGCXQQmgcR01BsH3KQbbJnK4ab:1lXJWhppC7v1Vl//qCt7tjLjHB7v5uGQ
Malware Config
Extracted
vipkeylogger
Signatures
-
Vipkeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2120-17-0x0000000000380000-0x00000000003DE000-memory.dmp
Files
-
2120-17-0x0000000000380000-0x00000000003DE000-memory.dmp.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ