General
-
Target
c052fea4cdcad892ce2eab8a0e9649a30548a0bdf6a44adb09eb5cf91737dc2e
-
Size
9KB
-
Sample
240911-d7ykxszhmn
-
MD5
7d21d574e7b0e6393a9d4e52ce3217b2
-
SHA1
8888ed0125fcea2630187cf4dbc3f79d903a5292
-
SHA256
c052fea4cdcad892ce2eab8a0e9649a30548a0bdf6a44adb09eb5cf91737dc2e
-
SHA512
a28cc8b1cad49431c146fecf72e45970bc916059cc5dc2c442629d65e354adde275d04e4f3245bfd0ed779f568a2ba608badadd6aa6de3259e9cf9d50516c78d
-
SSDEEP
192:Q6Bzh3fzTKFdhj9w9OD1D2F59k6bXCXxnnc5JiLHAqMY:5zxKFPjqsh/Xxc0z
Static task
static1
Behavioral task
behavioral1
Sample
quotation.scr
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
quotation.scr
Resource
win10v2004-20240802-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7291671710:AAGCLF2_8yzxPxb9Vlxy9pUy6yBLGLfnO5g/sendMessage?chat_id=2052461776
Targets
-
-
Target
quotation.scr
-
Size
17KB
-
MD5
cb2c30d2091499d07658bf03b9c845f3
-
SHA1
7b5632fd665c3c8f3d89422b3bca3a0f5c21d49d
-
SHA256
66fc0f4d6ae68e7df70946d5770d1f60be76d38bd633c10439f17b4ee6265c5c
-
SHA512
881931e0ac27e9f08f39e1054bac8d058f784759d2dbb2a9bdfee4b20b7dcaf97a12f8d9d2e42eb48a03e8e4d9c49a7a3c9838c8eb05bfa0db678440993b1601
-
SSDEEP
384:QeArlkT79tX3IInAff3jRNAssQxd/vQ3iGXF7:DLXvqxvsJ
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-