General

  • Target

    4680-330-0x0000000000490000-0x00000000004DA000-memory.dmp

  • Size

    296KB

  • MD5

    d8609a7213bd6bf92034ac22a8eff445

  • SHA1

    63af1f18131e958cf434c9379c5d7712fe7b7048

  • SHA256

    a472f2340cca36e15462104b1dc82a7bbc1e3b826e833cb215f046cd1e993af3

  • SHA512

    b57027074021a6d333732977c4cce744c69dca8edadd6107ccade112adebaf093ab230b876b1c442df943021c45c7656ab2095e36757d8c2676f1ff0e1b26bc3

  • SSDEEP

    3072:4bbOAI6D2D/F/+h6f1+WL+r7QXuBAYM9WsSYkXP3b7+9GmiLkYTKBgfiTbbY:fdJ0XP3bOAUb

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot8172976107:AAH5CXqEBGFF-CK18VpImdWAW7U_9296FqY/sendMessage?chat_id=6885960134

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4680-330-0x0000000000490000-0x00000000004DA000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections