General

  • Target

    2704-13-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    550cec14ec05bff2ad993c9b373a79fb

  • SHA1

    f3c65d199ec04bce6341d01986f2f8dde0b723a0

  • SHA256

    2abba6922fc9576d410ac0ffaacf63474a2ebaa23b8ad35296ea2d4a485fa3fc

  • SHA512

    2c86421e27287642b96b2873bb8c4b602c40d19a0ad8c901231a34e074fc646a0dbb1812d3d8b0da9fe86019d6bb771409d1a824f31acc55c0ce21727bc17910

  • SSDEEP

    3072:PbbOAI6D2D/F/YDeQLTL+r7QXuBAYM9Wh1LdwPjXb7oDymiL4YTKBgfi:6d8sL4Xbic

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7155890739:AAGk0jbDV2gAazIReZKFh86ZKJt--qaC54w/sendMessage?chat_id=1886630858

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2704-13-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections