General
-
Target
62831f52ad3aaa48bef7b40bf80f4661.bin
-
Size
725KB
-
Sample
240913-bl765awcpk
-
MD5
4cc79fc17f605af0d370e88015dbb753
-
SHA1
f0a33175bc3b72d5a461f9fdc70d73e8bb64e97f
-
SHA256
891c444e1a44c1c90448599be1d2ed2e66aedf6a22b9e0d7189e7ba4294cec47
-
SHA512
6f9ec6a824f47128c908606aa8e1276eefee75330393310d045989d3684f5439ba7decfe9fa0219a7da13ea03f0f8820030de6b395bc7955c14e229f66d11005
-
SSDEEP
12288:I09qZEpzk8powiQpByGblvY6MSCOZwiHzmPWBkz5OubUM1r8bbY6jF08tfw:DAZvwiQjyCYmvK4DYII
Static task
static1
Behavioral task
behavioral1
Sample
b5a624393544e6cb76dab6d34e0699d4f9b4155dce61ee9e3530f564841a0a96.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b5a624393544e6cb76dab6d34e0699d4f9b4155dce61ee9e3530f564841a0a96.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.sogicarafa.com - Port:
25 - Username:
[email protected] - Password:
logistics@dmin - Email To:
[email protected]
Targets
-
-
Target
b5a624393544e6cb76dab6d34e0699d4f9b4155dce61ee9e3530f564841a0a96.exe
-
Size
1.1MB
-
MD5
62831f52ad3aaa48bef7b40bf80f4661
-
SHA1
1927fec87ab542d634df33893f7c1c37bff36269
-
SHA256
b5a624393544e6cb76dab6d34e0699d4f9b4155dce61ee9e3530f564841a0a96
-
SHA512
d73fcf7822a3dd865f5c11edef718fff3023e700444cb8cb8be8196a783a24c69f6ab43cf4a5d31cc16356fa99c179bbd6794982566cd1a0e5ecc0e9bd1b3a79
-
SSDEEP
24576:mqDEvCTbMWu7rQYlBQcBiT6rprG8aI8A9rCd7A:mTvC/MTQYxsWR7aI/rCd
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-