General

  • Target

    2296-19-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    4481927991cd5a13841062aeaf7a1243

  • SHA1

    82f92e290c3711edf351f04238912b20a4a62fde

  • SHA256

    116776cff898e4711e5cc815b906bc6f583fdf8e1ef5699bd03489833fc9a215

  • SHA512

    604f88e2060a38e08dacfe8a6f00928ae6c5f1bd573d27d3cd85940a6dfc86f414132d7845d0ce95d192c519359d71d4ef80124832dcf0eab7f4a727f0ba9e4a

  • SSDEEP

    3072:Heej6++N7jjl4x/zhPBX1WEd4tik+eSLaHU10dKQnVb2QfDs0xZY/VgaiPbbY:lWueQy1nVb2sNb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2296-19-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections