General

  • Target

    2668-30-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    9298137de1f58c08e9a9eef8228acca1

  • SHA1

    ee597408fb5da2e0873b72449fd66be986008d42

  • SHA256

    092b93a2a19d9e7d478b975beca82889e83f759f59073404fddbdd57f9b75c60

  • SHA512

    888439d02ef2bae95de5e6d0563ffcf3e9183f3f7027e7e9274ef7170f25f0d5e56a6e58b6b54d876526199b413011739a258c3864b048edc4a804617bc13cd7

  • SSDEEP

    3072:naXETsdsFfluhrdcZXdfvuWUF/z2SLj3U10dKQnVb2QfDs0MZY/VgaiHbbY:ny2Hy1nVb2plb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2668-30-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections