Behavioral task
behavioral1
Sample
2600-39-0x0000000000480000-0x00000000004C8000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2600-39-0x0000000000480000-0x00000000004C8000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2600-39-0x0000000000480000-0x00000000004C8000-memory.dmp
-
Size
288KB
-
MD5
4381615d9a9d6ef7b12acddd6f0d625e
-
SHA1
361e39d5e4129734264761cca07067b49b7280d2
-
SHA256
ade144c5ca144e897144e486e65bb3a20ca027aaaced6f68e248483feeddd512
-
SHA512
99196dccbb15731effe745d9b3f0ab9c0ecbf1699a2ca1f014096e323e29e213127a1065880983b1e5051fd4990dfd5d48fcc49429bb654addde3ae09f62bd18
-
SSDEEP
6144:5K0jMsk4ciMA4W+hlEyUaq+YaeQB99PvPdHDYvCA02Xb+YZb:5K0jMsk4ciMA4W+hlEyUaq+YaeQB99Pc
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7511877228:AAEfdtsXiYLhmN4YbL4GOCHPaqlvykB-alc/sendMessage?chat_id=7534008929
Signatures
-
Vipkeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2600-39-0x0000000000480000-0x00000000004C8000-memory.dmp
Files
-
2600-39-0x0000000000480000-0x00000000004C8000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 263KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ