General
-
Target
c123a4fd5ba24020a1bd9bbba902fb3c2d5ef762179f0ebc80162fe3fa688157.exe
-
Size
1.2MB
-
Sample
241009-cq3ymstbpr
-
MD5
c6ea3307e9a65e875771de10447a16d8
-
SHA1
5017b674c445aee1da090dea0f721794ec0c5935
-
SHA256
c123a4fd5ba24020a1bd9bbba902fb3c2d5ef762179f0ebc80162fe3fa688157
-
SHA512
77c6fac0419705fd33e203c67310a4c5d5ef1d50ac328a5762f52fa8700962ccba91fbadf00d201fea521f04ff2253a42269d63daa807b222a1d259a5796a479
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaC63CsrjvJ32YgcniuY9vln:7JZoQrbTFZY1iaC3svvJmd3Xvln
Static task
static1
Behavioral task
behavioral1
Sample
c123a4fd5ba24020a1bd9bbba902fb3c2d5ef762179f0ebc80162fe3fa688157.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c123a4fd5ba24020a1bd9bbba902fb3c2d5ef762179f0ebc80162fe3fa688157.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.osconsupplies.com - Port:
587 - Username:
[email protected] - Password:
Fin#OSCn@2k2
Extracted
vipkeylogger
Targets
-
-
Target
c123a4fd5ba24020a1bd9bbba902fb3c2d5ef762179f0ebc80162fe3fa688157.exe
-
Size
1.2MB
-
MD5
c6ea3307e9a65e875771de10447a16d8
-
SHA1
5017b674c445aee1da090dea0f721794ec0c5935
-
SHA256
c123a4fd5ba24020a1bd9bbba902fb3c2d5ef762179f0ebc80162fe3fa688157
-
SHA512
77c6fac0419705fd33e203c67310a4c5d5ef1d50ac328a5762f52fa8700962ccba91fbadf00d201fea521f04ff2253a42269d63daa807b222a1d259a5796a479
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaC63CsrjvJ32YgcniuY9vln:7JZoQrbTFZY1iaC3svvJmd3Xvln
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-