General

  • Target

    2500-7-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    26ea8617ccdb33bb8a0faa965d21755b

  • SHA1

    9f50eb54b499290b2320fec8acde7c1265d6124a

  • SHA256

    f5320c8fc458af3290c72556d5680894d5730b4d3f2d0a8a39bf48776f5e86b4

  • SHA512

    1d4eeae3720aa67b626ca3d02e8e4c4b365d14f0ddd16ffda7c84fbbdc84429dab77a6f4109c9ddb38d89c9d822c6f4995c8f589ee8da52c757102a20398b7ee

  • SSDEEP

    3072:qaXETsdsFfluhrdcZXdfvuWUF/z2SLj3U10dKQnVb2QfDs0MZY/VgaiHbbY:Iy2Hy1nVb2plb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2500-7-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections