General

  • Target

    1216-34-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    8ad6f304edf0cda6d05307ae1b74ed3e

  • SHA1

    e909dd7d5a2fa0c2e8d415d4e999fcf65bbc3f0b

  • SHA256

    b8b895ec80f62092157a91278d164895b63f6003a13a4e22aee38084f4660f6d

  • SHA512

    976792d99246ff69e7afab058b5764a65213f4e10963e5fa9e4572b56c209d33af83ceb0fc82b70cfcb28e1199f8afc34c2cd8349aa008a7ad5d7853bf58cd1f

  • SSDEEP

    3072:DRS/rmeryu6p+W7UrpXNkxstad2lSLKwU10dKQnVb2QfDs0nZY/VgaiXbbY:Q7l9y1nVb2CVb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1216-34-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections