Extended Key Usages
ExtKeyUsageCodeSigning
Overview
overview
8Static
static
8Vespy-Grab...in.zip
windows10-2004-x64
1Vespy-Grab...eck.py
windows10-2004-x64
3Vespy-Grab...ook.py
windows10-2004-x64
3Vespy-Grab...der.py
windows10-2004-x64
3Vespy-Grab...pam.py
windows10-2004-x64
3Vespy-Grab...ok.txt
windows10-2004-x64
1Vespy-Grab...bug.py
windows10-2004-x64
3Vespy-Grab...iVM.py
windows10-2004-x64
3Vespy-Grab...ser.py
windows10-2004-x64
3Vespy-Grab...per.py
windows10-2004-x64
3Vespy-Grab...ord.py
windows10-2004-x64
3Vespy-Grab...ion.py
windows10-2004-x64
3Vespy-Grab...ing.py
windows10-2004-x64
3Vespy-Grab...per.py
windows10-2004-x64
3Vespy-Grab...ass.py
windows10-2004-x64
3Vespy-Grab...MSG.py
windows10-2004-x64
3Vespy-Grab...les.py
windows10-2004-x64
3Vespy-Grab...ide.py
windows10-2004-x64
3Vespy-Grab...rts.py
windows10-2004-x64
3Vespy-Grab...ger.py
windows10-2004-x64
3Vespy-Grab...ain.py
windows10-2004-x64
3Vespy-Grab...aft.py
windows10-2004-x64
3Vespy-Grab...3ke.py
windows10-2004-x64
3Vespy-Grab...ork.py
windows10-2004-x64
3Vespy-Grab...oot.py
windows10-2004-x64
3Vespy-Grab...lox.py
windows10-2004-x64
3Vespy-Grab...tup.py
windows10-2004-x64
3Vespy-Grab...ram.py
windows10-2004-x64
3Vespy-Grab...ler.py
windows10-2004-x64
3Vespy-Grab...ets.py
windows10-2004-x64
3Vespy-Grab...tils/a
windows10-2004-x64
1Vespy-Grab...px.exe
windows10-2004-x64
5Behavioral task
behavioral1
Sample
Vespy-Grabber-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Vespy-Grabber-main/tools/CookieCheck.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Vespy-Grabber-main/tools/EncodeWebhook.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Vespy-Grabber-main/tools/GroupFinder.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Vespy-Grabber-main/tools/WebhookSpam.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
Vespy-Grabber-main/tools/webhook.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Vespy-Grabber-main/utils/AntiDebug.py
Resource
win10v2004-20240910-en
Behavioral task
behavioral8
Sample
Vespy-Grabber-main/utils/AntiVM.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Vespy-Grabber-main/utils/Browser.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
Vespy-Grabber-main/utils/Clipper.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Vespy-Grabber-main/utils/Discord.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
Vespy-Grabber-main/utils/DiscordInjection.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Vespy-Grabber-main/utils/DiscordSpreading.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
Vespy-Grabber-main/utils/Dropper.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Vespy-Grabber-main/utils/DropperClass.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
Vespy-Grabber-main/utils/ErrorMSG.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Vespy-Grabber-main/utils/Files.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
Vespy-Grabber-main/utils/Hide.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Vespy-Grabber-main/utils/Imports.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
Vespy-Grabber-main/utils/Keylogger.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Vespy-Grabber-main/utils/Main.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
Vespy-Grabber-main/utils/Minecraft.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Vespy-Grabber-main/utils/N3ke.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
Vespy-Grabber-main/utils/Network.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Vespy-Grabber-main/utils/Reboot.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
Vespy-Grabber-main/utils/Roblox.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Vespy-Grabber-main/utils/Startup.py
Resource
win10v2004-20240910-en
Behavioral task
behavioral28
Sample
Vespy-Grabber-main/utils/Telegram.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Vespy-Grabber-main/utils/VPNstealer.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
Vespy-Grabber-main/utils/Wallets.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Vespy-Grabber-main/utils/a
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
Vespy-Grabber-main/utils/upx.exe
Resource
win10v2004-20240802-en
Target
Vespy-Grabber-main.zip
Size
4.6MB
MD5
508eda1c12ca98e351289d1ef97b16b4
SHA1
5c4c2708d3c6aacd96413586994dd34cec2f9a15
SHA256
e1d50e3194be515eb994f25e458627036085eee29cbc1842ed34ae08a92dddee
SHA512
3a543e7e87e5dc164a95e504c521a8502eb2dbd4a3112515df94f74f03469ed074ff2ce43cb0be529716d1643161df61bed35bd117972e00becfdc0c7f1d1eca
SSDEEP
98304:v4gN7HJNa5iHTP7yztuzU32IeBcwXB3XpiRMH+cuaAr8Db:v4gpTa5QTPGRuzU32fBH0RMezO
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource | yara_rule |
---|---|
static1/unpack002/out.upx | patched_upx |
resource | yara_rule |
---|---|
static1/unpack001/Vespy-Grabber-main/utils/upx.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/Vespy-Grabber-main/utils/upx.exe |
unpack002/out.upx |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\a\1\s\Win32\Release\ProcDump.pdb
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
StrStrIW
Sleep
DeleteCriticalSection
K32GetModuleBaseNameW
ReadProcessMemory
K32EnumProcessModules
GetTickCount
SizeofResource
GetCurrentProcess
ExpandEnvironmentStringsW
WaitForDebugEvent
InitializeCriticalSection
GetFileAttributesW
DebugActiveProcessStop
ResumeThread
ContinueDebugEvent
OpenProcess
GetLastError
LockResource
DeleteFileW
CreateThread
LoadResource
FindResourceW
DebugActiveProcess
CreateProcessW
FreeLibrary
GetExitCodeProcess
MultiByteToWideChar
FormatMessageW
SetConsoleCtrlHandler
TerminateProcess
GetFullPathNameW
WaitForMultipleObjects
GetEnvironmentVariableA
K32GetProcessImageFileNameW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
CloseHandle
GetCurrentDirectoryW
GetCurrentProcessId
SystemTimeToTzSpecificLocalTime
GetSystemTime
DebugBreak
IsDebuggerPresent
GetFileSizeEx
CreateFileW
ReleaseSemaphore
GetProcessId
GetThreadContext
SetFilePointerEx
GetTimeFormatW
ExitProcess
CreateSemaphoreW
GetDateFormatW
OpenThread
DeviceIoControl
GetCurrentThread
VirtualQueryEx
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadFile
GetConsoleOutputCP
FlushFileBuffers
ReadConsoleW
DecodePointer
SetEvent
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
GetModuleFileNameW
WaitForSingleObject
GetFileType
GetModuleHandleW
LocalFree
GetProcAddress
LocalAlloc
GetStdHandle
GetCommandLineW
LoadLibraryExW
GetVersionExW
SetLastError
CreateEventW
OpenEventW
GetStringTypeW
HeapSize
HeapReAlloc
WriteConsoleW
SetEndOfFile
GetSystemInfo
ReadConsoleInputW
SetConsoleMode
GetConsoleMode
WideCharToMultiByte
LCMapStringW
CompareStringW
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetConsoleCP
SetStdHandle
WriteFile
GetCommandLineA
HeapFree
SendMessageW
EndDialog
GetDlgItem
SetCursor
LoadCursorW
DialogBoxIndirectParamW
GetSysColorBrush
EnumWindows
InflateRect
wsprintfW
GetWindowThreadProcessId
IsWindowVisible
IsHungAppWindow
LoadStringA
SetWindowTextW
StartPage
EndDoc
GetDeviceCaps
SetMapMode
StartDocW
EndPage
PrintDlgW
RegDeleteValueW
CloseServiceHandle
OpenSCManagerW
EnumServicesStatusExW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegCreateKeyW
RegQueryValueExW
CommandLineToArgvW
CoInitializeEx
CoCreateInstance
CoAllowSetForegroundWindow
CLSIDFromString
CoUninitialize
PdhGetFormattedCounterValue
PdhCollectQueryData
PdhAddCounterW
PdhOpenQueryW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE