General

  • Target

    1012-41-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    6be887cd3a46452afe9bf08b1b49e581

  • SHA1

    89b3ac24b7d27cdb9a24eca7e36a71df8766804f

  • SHA256

    ebf73046f4eb66dca4eafb032b46dc2d649808799ed0d6f4584ad0121e09e0f6

  • SHA512

    fd549d7f6a43f5db361dca602157a67521d7252012b89ce9801f607280f58bc4aea2c50a5fa4c4347f6c6ddcd039723f4aa4c5e63327b76b73781224f0ab87d9

  • SSDEEP

    3072:PRS/rmeryu6p+W7UrpXNkxstad2lSLKwU10dKQnVb2QfDs0nZY/VgaiXbbY:k7l9y1nVb2CVb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1012-41-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections