General

  • Target

    2600-39-0x0000000000480000-0x00000000004C8000-memory.dmp

  • Size

    288KB

  • MD5

    4381615d9a9d6ef7b12acddd6f0d625e

  • SHA1

    361e39d5e4129734264761cca07067b49b7280d2

  • SHA256

    ade144c5ca144e897144e486e65bb3a20ca027aaaced6f68e248483feeddd512

  • SHA512

    99196dccbb15731effe745d9b3f0ab9c0ecbf1699a2ca1f014096e323e29e213127a1065880983b1e5051fd4990dfd5d48fcc49429bb654addde3ae09f62bd18

  • SSDEEP

    6144:5K0jMsk4ciMA4W+hlEyUaq+YaeQB99PvPdHDYvCA02Xb+YZb:5K0jMsk4ciMA4W+hlEyUaq+YaeQB99Pc

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7511877228:AAEfdtsXiYLhmN4YbL4GOCHPaqlvykB-alc/sendMessage?chat_id=7534008929

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2600-39-0x0000000000480000-0x00000000004C8000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections