General

  • Target

    2588-24-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    612bb1e8d95decf8c0a6648d6495b20b

  • SHA1

    d9b9ca695e723d39de31952f62fa9a079a919c22

  • SHA256

    92ceee28d35b406641c84bfdda5ff8526252ee89ade9e650f49a281732f7ff75

  • SHA512

    8195c1d604b1ec284fa0deeaea39ba65f9866c0f76ecc1d0928dfa312744beb409999c55450c96bbfc882a3118f29caa3e4383a06e676f2fae7c0d285fd1e2ad

  • SSDEEP

    3072:qaXETsdsFfluhrdcZXdfvuWUF/z2SLj3U10dKQnVb2QfDs0MZY/Vgai:Iy2Hy1nVb2p

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2588-24-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections