General

  • Target

    616-7-0x0000000000400000-0x000000000044A000-memory.dmp

  • Size

    296KB

  • MD5

    b540102ee3940aad1ff42e5a236d158d

  • SHA1

    119d39ec49b0c48a6110904385c0e0f14a0aae67

  • SHA256

    d32e25016b2b323eb6a581653ab7ef654f191b4896f51e6b3acf1355ef2a6369

  • SHA512

    4a6d0f6c3f4f893c148e586644d84cd26da8070f84f7c2fa32678cd9684c5072cd1414f859c5795773d1859d163e8b465ff731fa9a413713de77168cb04a10aa

  • SSDEEP

    6144:OD44+Kq+lteQ0yCQIEcSE4M+LE2V17i7ORrn5Z9gobx5Arr9sw+asE8Ixpi+gVNR:tbvcAc

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 616-7-0x0000000000400000-0x000000000044A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections