General

  • Target

    1592-1343-0x0000000000340000-0x000000000038A000-memory.dmp

  • Size

    296KB

  • MD5

    a97c390b4d526ad17761986765661bdc

  • SHA1

    edb3c3e712629d05a85e0eb556bb502f5d8a4655

  • SHA256

    921161d53728178e903cd818b6bfed0952e06b0fcc297f01f681f7b66c1f4835

  • SHA512

    40813377a2f9bdee68d467ace345d07de5b88bc437f4ec5fb290c1ac8b2011530014e75c1b1cb5c19fdc93382758f47ac875709a4700ebe715de0de4ef9ef0d9

  • SSDEEP

    3072:2bbOAI6D2D/F/+h6f1+WL+r7QXuBAYM9WjZEquwb7v+bmmiLHYTKBgfiIbbY:RdJXwbGgQb

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot8082602195:AAFEfFJhrQIeYK1ePwWkv9BtH5VWo-1iIJM/sendMessage?chat_id=5101327412

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1592-1343-0x0000000000340000-0x000000000038A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections