General

  • Target

    2200-17-0x0000000000400000-0x000000000044A000-memory.dmp

  • Size

    296KB

  • MD5

    2ee754a0788f4ee5638ec9df4a81e787

  • SHA1

    fd3eaf2fdd2b1b0a8a115c202b6a02d9c858c1ee

  • SHA256

    cb9ff184ca490976e0f995485ff97d83ba02e7e72931446a942c5c703a5bf747

  • SHA512

    60197ed08c21d8c75f04e6ad6b774329f165363ad4586c8ff1d3cf5aa16876ec17a18161a46419ae9b7bb85476886260e6fc2eb94f97c9a090791c036fd7c4a1

  • SSDEEP

    6144:XX35R1AeWzSFzdN/T/nZMqoXV+SK/1pxHZcskZpPBpG+e36aKbZzb:35R1AeWzSFzdN/T/nZMqoXV+SK/1pxHm

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2200-17-0x0000000000400000-0x000000000044A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections