General
-
Target
ILS0592024DI6408.exe
-
Size
820KB
-
Sample
240905-vtthgswfjf
-
MD5
92ecfa3057b13a3547c3648bb598e35c
-
SHA1
6f6407e1e4b2902c076788dca65211929a34be2e
-
SHA256
b1e547ad1c0cf9657a3a531d98fee7bfb93bd86c223f4aeaeafd841c6ae948d8
-
SHA512
86b4c0911417861dc15544076ab9c7e03045f911201cbc51ee5ed113242505680bf74a9b02b20d3883ae2f2712795b65975ebbb988520c7a9eadac459f35e8ca
-
SSDEEP
12288:Ge21UoIG5MPUdq/k0kGpk9xDcYnC/0ESJPQTqAwa9w9kAFOu7XouOSZdAZk1jDZf:oUobyIq/k0bmxSUr37Ou7X0SB1j
Static task
static1
Behavioral task
behavioral1
Sample
ILS0592024DI6408.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ILS0592024DI6408.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
ILS0592024DI6408.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mruyz.com - Port:
587 - Username:
[email protected] - Password:
C[.QvNRF}fDS - Email To:
[email protected]
Targets
-
-
Target
ILS0592024DI6408.exe
-
Size
820KB
-
MD5
92ecfa3057b13a3547c3648bb598e35c
-
SHA1
6f6407e1e4b2902c076788dca65211929a34be2e
-
SHA256
b1e547ad1c0cf9657a3a531d98fee7bfb93bd86c223f4aeaeafd841c6ae948d8
-
SHA512
86b4c0911417861dc15544076ab9c7e03045f911201cbc51ee5ed113242505680bf74a9b02b20d3883ae2f2712795b65975ebbb988520c7a9eadac459f35e8ca
-
SSDEEP
12288:Ge21UoIG5MPUdq/k0kGpk9xDcYnC/0ESJPQTqAwa9w9kAFOu7XouOSZdAZk1jDZf:oUobyIq/k0bmxSUr37Ou7X0SB1j
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-