General

  • Target

    2500-7-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    3941c1d126a799c4ecc7272db0ecdca0

  • SHA1

    069a425d9445d8ca30dbbe89ecc8b8c1084fe6ea

  • SHA256

    c4fd609e872a76c9cdd86e4efeea601f4ed5a471c7aed15544d0e772d6e671ea

  • SHA512

    1bb3732ecdafde06097436fe263eb91023306528cae0145c6c51d26aa1991643b4ec1dd67f5312a321c0a4a6a7a4fccce17c97a8d8d648c1be7d529fbaa14ed3

  • SSDEEP

    3072:qIj5aLv7yu64PGwhq5X9aqVF4kWnjSLKqU10dKQnVb2QfDs0wZY/VgainbbY:XGjHy1nVb2VFb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2500-7-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections