Behavioral task
behavioral1
Sample
ccx.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ccx.exe
Resource
win10v2004-20240802-en
General
-
Target
ccx.exe
-
Size
270KB
-
MD5
d72263757f4d9d0ef3e9288e91822b46
-
SHA1
c3bf10d2c8fc10039927cccb779f79674e176e52
-
SHA256
422fddd62a3b2cb164f98510f6722fe29e65b417ad0de20a579744d1d28d0566
-
SHA512
6cdff7da42361324ba10da9f090ba55b63499973c1981d1fc4ce22325c3f37edbedd51b61cbb3588a03205abbd1455367c655f10c933f27e1ac5af467ad7bd16
-
SSDEEP
3072:pI5Tg/d2BQFLFoOYmEr3isrlqeL4RXahKkphlmRQ9RgNpH4CDATb4yaDjzDsjf3X:5pS97TL5dh7m2bkbkSb
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.transafrique.cm - Port:
587 - Username:
[email protected] - Password:
Bse#Anr@2023 - Email To:
[email protected]
https://api.telegram.org/bot7352278611:AAER5CxmTn5i-KV6VdTyagsHmnJB_kToCHY/sendMessage?chat_id=2113693796
Signatures
-
Vipkeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ccx.exe
Files
-
ccx.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 265KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ