General
-
Target
454fb17dd52c3f5242559256394ee1b429c0b70d894ac94ae14ab64ba40f7b4c
-
Size
661KB
-
Sample
240829-dpz12a1cna
-
MD5
e00acf9f47426adf08aca4758a4c847e
-
SHA1
94d8967ef34e3caf16cd7e85d86f902f2a320bdb
-
SHA256
454fb17dd52c3f5242559256394ee1b429c0b70d894ac94ae14ab64ba40f7b4c
-
SHA512
d7c69040e2703a056653ca922f170ee94a23db55e7323e96da0bed04c061e319ae12dc52cac07c020a1f818f7d2a60809728d449cc7cebbfe42516c42c480b91
-
SSDEEP
12288:cXlzDHsTKy+pPYWgw/ubB/SqDpGwChA2bc4Om6wbAdpfZ1Zw2crvExLm+r:mlzDHUl9w/ipCGVm6o2pR1arvEx9
Static task
static1
Behavioral task
behavioral1
Sample
QTE070624.scr
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
QTE070624.scr
Resource
win10v2004-20240802-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.al-subai.com - Port:
587 - Username:
[email protected] - Password:
information12 - Email To:
[email protected]
https://api.telegram.org/bot7236590670:AAEZk9ec6tcUIipI8D5VK8zyHeQjcafFyOY/sendMessage?chat_id=2052461776
Targets
-
-
Target
QTE070624.scr
-
Size
690KB
-
MD5
ef321f0fca2075c4f5157490e4c4d779
-
SHA1
ad662ef5ca396da788abefbe8efe773f2a4b9c0e
-
SHA256
b40673c42c88df884d3931e1c3c45a273ca2c205ce13efc989ad8d84aeaa78fa
-
SHA512
28bf8a2a39e254fc92fcaf8db563f3ca40912ef8aef7d3daf3ac853af4cf78a764812d7c4d621b865a1492adb0ad433a8f103fd5760e1d8967e48dc88bc54320
-
SSDEEP
12288:qVVAYO4Zn/f+p9jA3bHcBFxe58MVTTh/u+Ol61Rq3w:ceCn/4A3IBer5dVa0q
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-