General

  • Target

    1516-342-0x0000000000480000-0x00000000004CA000-memory.dmp

  • Size

    296KB

  • MD5

    95fc8154846c73334bbaff32c6eee4ee

  • SHA1

    9ba82b8e424cc0386d62a4e2c75fa3bb834bcf24

  • SHA256

    468648af9f33a231603976fda81bdb804bc072cdf06faf8b734576ca09d40798

  • SHA512

    6f770ac96141ee2af203fb8c6f3ef0ad1a738522085cd04ebc9d75329b47e9ff2c72655b8886ea6976a5c69dbc664479ac43fa994c1592cb7e6cd1581f5dee4e

  • SSDEEP

    3072:4bbOAI6D2D/F/+h6f1+WL+r7QXuBAYM9WFfYw6OQhchb7TmiLbYTKBgfiBbbY:fdJ+1QhwbZLb

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7618867847:AAF14vnGvkJJYcxLyMVdR3OZPzd4TQzD_OY/sendMessage?chat_id=6070006284

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1516-342-0x0000000000480000-0x00000000004CA000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections