Behavioral task
behavioral1
Sample
1736-76-0x0000000000480000-0x00000000004C8000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1736-76-0x0000000000480000-0x00000000004C8000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
1736-76-0x0000000000480000-0x00000000004C8000-memory.dmp
-
Size
288KB
-
MD5
45240ce617f31fcb1eabc948e663d50d
-
SHA1
ae013c997c090e6cf2ef6bb7b9391816ccb6453b
-
SHA256
2aac8426c044c83be4f9d4228b77df72024ffdabc122170ae5f7239ae31bb668
-
SHA512
16e5dad03284fa88b7e45ffee5e47aa43d8e3b5631c1ec908f252d1ab870aede145943ac7941fe22cb7b605b1a0c28eabd8b7f67f67745cd4c0f1c07aa5946ea
-
SSDEEP
3072:YbgUViDA2CimPgFPgg0C0Y0x0u0S0Eqr1Fg7f5Sdd9+NcB7qJmbtlb7v5EmiLAYZ:FEAmYFY9vV+r/bddDbvbz5+Sb
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7581561605:AAGI-5iG4DeXqVhNDvhaICvGbOejumUD6AE/sendMessage?chat_id=5434550993
Signatures
-
Vipkeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1736-76-0x0000000000480000-0x00000000004C8000-memory.dmp
Files
-
1736-76-0x0000000000480000-0x00000000004C8000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 263KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ