General

  • Target

    2964-16-0x0000000140000000-0x0000000140046000-memory.dmp

  • Size

    280KB

  • MD5

    e65ddb07230a28a12c9db43a9acda3c0

  • SHA1

    365e3b8052a46cbd6d831ea6a569ff0242c5d3db

  • SHA256

    c23d5db4b6eea7e62659ae58f49cfd4028f190b24b2b042bc28631ba1c179a5e

  • SHA512

    3747398c25325b4288257ecd547b5a4d628f178b23deb45c455a14d3e3182fdebb21fe090b24bb6d292416bc5d0821e5efb4b5715da7cc3d711aa0975c09916e

  • SSDEEP

    3072:o6amN1ztIB4gB4DRVqFxNOrNJpSakdKQs73YgHqGtPpboOxb7RRI50FGso8ZY/V7:VwBNB+ooth5b3Zjb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2964-16-0x0000000140000000-0x0000000140046000-memory.dmp
    .exe windows:4 windows x64 arch:x64


    Headers

    Sections