General

  • Target

    1028-12-0x0000000000400000-0x000000000044A000-memory.dmp

  • Size

    296KB

  • MD5

    a91b97d8caac2ee72a04c1a4f5e660a8

  • SHA1

    63930eabc1a6e8592f2b00f83e097546bcad9340

  • SHA256

    a006c7b5432d05009493adafd491122dff5872ea14945759f6e0a818eacfdcd5

  • SHA512

    6764053acd6dc57e370987ba0b8ac193dd2c2b4f2d55c9930083307e614a92e624f7d918d5a4aae175ecd8647570e50870c6703edb65b130c8eb81f2ae60c2a7

  • SSDEEP

    3072:DicrbDkA33F3W5j/agPXQdwflU4uSL1CC2TRbIxso/UY/Vg4iKbbY:AuVTRbudb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1028-12-0x0000000000400000-0x000000000044A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections