General

  • Target

    1696-97-0x00000000007D0000-0x000000000081A000-memory.dmp

  • Size

    296KB

  • MD5

    45e878c956c60198e7908c610261e95f

  • SHA1

    9416c26e61d1d24951eb57c30459deccb013de66

  • SHA256

    7bb95f9a528fa8a9266546001541ea3b3566e2b9d13a6443420378e42ccd59bd

  • SHA512

    6b7eeef773e8f31c3e77e9ab5571bd950c94fa0d775950c25ddd9bdc2bf106c05758c332e8ff101d54ccad7013785bd9adf2482c872d5bf8c5e371fe3be45257

  • SSDEEP

    3072:VbbOAI6D2D/F/+h6f1+WL+r7QXuBAYM9WDgePFF7sJb7hXmiL1YTKBgfinbbY:cdJLusJbt5fb

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7950187892:AAGsaHbTZULExJN6JaJZFgwgKccygMmel5s/sendMessage?chat_id=7050097659

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1696-97-0x00000000007D0000-0x000000000081A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections