General

  • Target

    1736-76-0x0000000000480000-0x00000000004C8000-memory.dmp

  • Size

    288KB

  • MD5

    45240ce617f31fcb1eabc948e663d50d

  • SHA1

    ae013c997c090e6cf2ef6bb7b9391816ccb6453b

  • SHA256

    2aac8426c044c83be4f9d4228b77df72024ffdabc122170ae5f7239ae31bb668

  • SHA512

    16e5dad03284fa88b7e45ffee5e47aa43d8e3b5631c1ec908f252d1ab870aede145943ac7941fe22cb7b605b1a0c28eabd8b7f67f67745cd4c0f1c07aa5946ea

  • SSDEEP

    3072:YbgUViDA2CimPgFPgg0C0Y0x0u0S0Eqr1Fg7f5Sdd9+NcB7qJmbtlb7v5EmiLAYZ:FEAmYFY9vV+r/bddDbvbz5+Sb

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7581561605:AAGI-5iG4DeXqVhNDvhaICvGbOejumUD6AE/sendMessage?chat_id=5434550993

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1736-76-0x0000000000480000-0x00000000004C8000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections