General
-
Target
c2eeaac42cb00a62f524385cf12985c51a11e5e1899839086e5f93ebf7614f11.img
-
Size
1.6MB
-
Sample
241024-cl3r3ssblq
-
MD5
cc8b10ae7e72c694d6af4ec5bdebc6a6
-
SHA1
98ca256153ac4bf9a86afbbcb56a1bbc85ce2fb7
-
SHA256
c2eeaac42cb00a62f524385cf12985c51a11e5e1899839086e5f93ebf7614f11
-
SHA512
662e212fe9c69602d4607a04b224cfc73bd626f87964f71349205ff0c99602a18f8c16f63d3b42ae3d1d5f45d7ce0468c2ed00b86edfa06614b15d73a564fb2b
-
SSDEEP
24576:afmMv6Ckr7Mny5QL+7NcN+VNwAC+inTnjoG:a3v+7/5QLiNi+Vqb+iTnjoG
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry N_ TM23-10-00.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Inquiry N_ TM23-10-00.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Targets
-
-
Target
Inquiry N_ TM23-10-00.exe
-
Size
1.1MB
-
MD5
9841a84f5212786b4817a31606a52bb5
-
SHA1
bcfe6a3519ffb3befde5b76c222cfbc23bfbf862
-
SHA256
07b7893fd55f0b3a12d3909af01c3cf490667b3bdcdfd4cddf69a3137d06ebd6
-
SHA512
2c1698cb058e519c561dc662d5969d7a78af343ae0b6516e25fe3bab0a41ae24bc68662b0f0127b6f0fa9ebafb936879d32895f64f2636e02e288b3af9997a39
-
SSDEEP
24576:ffmMv6Ckr7Mny5QL+7NcN+VNwAC+inTnjoG+:f3v+7/5QLiNi+Vqb+iTnjoG+
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-