General

  • Target

    2820-14-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    f968dec41c217fc246312c436628554c

  • SHA1

    205bb5f503d5e46d8530f856d958b68d84a61e89

  • SHA256

    837c419f6a828b869228f93b82602fb6c721fbd06081ccf9dd038aecd328352e

  • SHA512

    9fc5a129fd2fed86547ec9963971e5f91767003b63f077774aed6c08635edfa8b891965e8d8fee50005803eaf74ae63df6cf06719404aedca3be4170f6e0d8c6

  • SSDEEP

    3072:eeej6++N7jjl4x/zhPBX1WEd4tik+eSLaHU10dKQnVb2QfDs04ZY/VgaiPbbY:aWueQy1nVb21Nb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2820-14-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections