General

  • Target

    2812-11-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    94820d65e3716f9e613fca4a15de4bac

  • SHA1

    c9fba4c4bf744f6aab5107ff0e75046827321534

  • SHA256

    c35c19ac8732fc6438df69ba28961baa0af5eb277dff773f282898c0f2a7f9fc

  • SHA512

    d270a381e509ee5b86e1bc5a579aae4a3f40276fe203dc00f9cc181fd66a5216c28b8252a39ad77a3e44eb28c1560a9da02cc96c58ff5d7fe92a0072eb0ccb05

  • SSDEEP

    3072:q+OPH2MS7ZHlUSQvZXdYhJF24A+c2cxNnXr75agycd3gc0NhtHduumiQ/JRofI07:ukkGqWVry1nVb2clb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2812-11-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections