Behavioral task
behavioral1
Sample
2704-13-0x0000000000400000-0x0000000000448000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2704-13-0x0000000000400000-0x0000000000448000-memory.exe
Resource
win10v2004-20250217-en
General
-
Target
2704-13-0x0000000000400000-0x0000000000448000-memory.dmp
-
Size
288KB
-
MD5
550cec14ec05bff2ad993c9b373a79fb
-
SHA1
f3c65d199ec04bce6341d01986f2f8dde0b723a0
-
SHA256
2abba6922fc9576d410ac0ffaacf63474a2ebaa23b8ad35296ea2d4a485fa3fc
-
SHA512
2c86421e27287642b96b2873bb8c4b602c40d19a0ad8c901231a34e074fc646a0dbb1812d3d8b0da9fe86019d6bb771409d1a824f31acc55c0ce21727bc17910
-
SSDEEP
3072:PbbOAI6D2D/F/YDeQLTL+r7QXuBAYM9Wh1LdwPjXb7oDymiL4YTKBgfi:6d8sL4Xbic
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7155890739:AAGk0jbDV2gAazIReZKFh86ZKJt--qaC54w/sendMessage?chat_id=1886630858
Signatures
-
Vipkeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2704-13-0x0000000000400000-0x0000000000448000-memory.dmp
Files
-
2704-13-0x0000000000400000-0x0000000000448000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ