General
-
Target
7789d88b143324fb53a504a5f340d18d202b1ef21eb004badbdd7ffba4f0fa2e.exe
-
Size
1.9MB
-
Sample
241024-b6fbvayeqh
-
MD5
cf2904fe594a57b07865e0a5c5564802
-
SHA1
832aa9b62e1d778942a4079c9d2637e0a0e802b1
-
SHA256
7789d88b143324fb53a504a5f340d18d202b1ef21eb004badbdd7ffba4f0fa2e
-
SHA512
93bba7bcc3caff180cf1d0f7c2cc99a08ebc31eaf63988273e42a542ae155537382b2a149f53c0fc360ce3f87d31b7980f7b3edd1266683de560623a11869217
-
SSDEEP
12288:VYKE392PohWoHazJTNVpGNWw+TUiGV3z+YgSj:KK+2kETjkJ4Opz+YgSj
Static task
static1
Behavioral task
behavioral1
Sample
7789d88b143324fb53a504a5f340d18d202b1ef21eb004badbdd7ffba4f0fa2e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7789d88b143324fb53a504a5f340d18d202b1ef21eb004badbdd7ffba4f0fa2e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7872855149:AAEZ5N2AflriII8w90vDMIlh-npPaeOdWpk/sendMessage?chat_id=5259132764
Targets
-
-
Target
7789d88b143324fb53a504a5f340d18d202b1ef21eb004badbdd7ffba4f0fa2e.exe
-
Size
1.9MB
-
MD5
cf2904fe594a57b07865e0a5c5564802
-
SHA1
832aa9b62e1d778942a4079c9d2637e0a0e802b1
-
SHA256
7789d88b143324fb53a504a5f340d18d202b1ef21eb004badbdd7ffba4f0fa2e
-
SHA512
93bba7bcc3caff180cf1d0f7c2cc99a08ebc31eaf63988273e42a542ae155537382b2a149f53c0fc360ce3f87d31b7980f7b3edd1266683de560623a11869217
-
SSDEEP
12288:VYKE392PohWoHazJTNVpGNWw+TUiGV3z+YgSj:KK+2kETjkJ4Opz+YgSj
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-