General
-
Target
e9cc9e8addc05d7d1d1b558e8e99356ba4e267217eab2c86d49ab40aa7d1c85e.exe
-
Size
1.1MB
-
Sample
241009-kseylavfne
-
MD5
dc89b257e4dbe970fc2808db59eedc5b
-
SHA1
70d81bcb40cbccc9ae5fb45682ef2525bb2f7c9f
-
SHA256
e9cc9e8addc05d7d1d1b558e8e99356ba4e267217eab2c86d49ab40aa7d1c85e
-
SHA512
74c753dd7fff6b9b779c6f280f9f356d2130c13b9082f1c95bdc86186b64509cf948c982235b883c7c089a23acee572d6cbe1b68c2ea0aa8fe0fec991be24194
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCNxbAlU4l87aq7+uB3iLENiaZBPp:7JZoQrbTFZY1iaCNxl/7quBS+iaZH
Static task
static1
Behavioral task
behavioral1
Sample
e9cc9e8addc05d7d1d1b558e8e99356ba4e267217eab2c86d49ab40aa7d1c85e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e9cc9e8addc05d7d1d1b558e8e99356ba4e267217eab2c86d49ab40aa7d1c85e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.plastikgogic.rs - Port:
587 - Username:
[email protected] - Password:
martINAMng22320in
Extracted
vipkeylogger
Targets
-
-
Target
e9cc9e8addc05d7d1d1b558e8e99356ba4e267217eab2c86d49ab40aa7d1c85e.exe
-
Size
1.1MB
-
MD5
dc89b257e4dbe970fc2808db59eedc5b
-
SHA1
70d81bcb40cbccc9ae5fb45682ef2525bb2f7c9f
-
SHA256
e9cc9e8addc05d7d1d1b558e8e99356ba4e267217eab2c86d49ab40aa7d1c85e
-
SHA512
74c753dd7fff6b9b779c6f280f9f356d2130c13b9082f1c95bdc86186b64509cf948c982235b883c7c089a23acee572d6cbe1b68c2ea0aa8fe0fec991be24194
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCNxbAlU4l87aq7+uB3iLENiaZBPp:7JZoQrbTFZY1iaCNxl/7quBS+iaZH
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-