General

  • Target

    2824-21-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    b57366682fa9900067c6dcc054cee658

  • SHA1

    6aac88c8d0c464346bed65fedef4417ccfe5b11f

  • SHA256

    b3ce3ce283aaad30220f86b057a972fd552aa9617c10ac0f44c0d36eb2be1869

  • SHA512

    7a5be7181353bd83e3408d4961b08786c6cc729acb68c6c6ad8f846ae5abf5a2a18c964f902b7c2a9ec4a57e1a96481db292cdd771fe1e278d39f4d82b009a9e

  • SSDEEP

    3072:TRS/rmeryu6p+W7UrpXNkxstad2lSLKwU10dKQnVb2QfDs0nZY/VgaiXbbY:g7l9y1nVb2CVb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2824-21-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections