Behavioral task
behavioral1
Sample
1696-97-0x00000000007D0000-0x000000000081A000-memory.exe
Resource
win10v2004-20250314-en
General
-
Target
1696-97-0x00000000007D0000-0x000000000081A000-memory.dmp
-
Size
296KB
-
MD5
45e878c956c60198e7908c610261e95f
-
SHA1
9416c26e61d1d24951eb57c30459deccb013de66
-
SHA256
7bb95f9a528fa8a9266546001541ea3b3566e2b9d13a6443420378e42ccd59bd
-
SHA512
6b7eeef773e8f31c3e77e9ab5571bd950c94fa0d775950c25ddd9bdc2bf106c05758c332e8ff101d54ccad7013785bd9adf2482c872d5bf8c5e371fe3be45257
-
SSDEEP
3072:VbbOAI6D2D/F/+h6f1+WL+r7QXuBAYM9WDgePFF7sJb7hXmiL1YTKBgfinbbY:cdJLusJbt5fb
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7950187892:AAGsaHbTZULExJN6JaJZFgwgKccygMmel5s/sendMessage?chat_id=7050097659
Signatures
-
Vipkeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1696-97-0x00000000007D0000-0x000000000081A000-memory.dmp
Files
-
1696-97-0x00000000007D0000-0x000000000081A000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 266KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ