General
-
Target
3ba352819c7abd6700100363b3f63e070549433564bd7636cdd0cf53b6356dc2N
-
Size
802KB
-
Sample
241026-n8rtwasjhy
-
MD5
280846047c1c992d510de8e8e55c59d0
-
SHA1
dd90f1a5223c6a92679c138b88531c7ed13763c2
-
SHA256
3ba352819c7abd6700100363b3f63e070549433564bd7636cdd0cf53b6356dc2
-
SHA512
badd464536ca06951298b31637f4b081671c18f9c4280490954016a9f6811b29334e32db3163156275f86715a4366ce49f265eec5ddb6e02f07c0d4c1137c63d
-
SSDEEP
24576:hYJW0Qyhwv6LcDU99IFkuyvo9rVzk6BQYYij2B0YY:4Zwv6LYU9ebyvolL2iYY
Static task
static1
Behavioral task
behavioral1
Sample
3ba352819c7abd6700100363b3f63e070549433564bd7636cdd0cf53b6356dc2N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3ba352819c7abd6700100363b3f63e070549433564bd7636cdd0cf53b6356dc2N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.tmars.net - Port:
587 - Username:
[email protected] - Password:
More@123456789 - Email To:
[email protected]
Targets
-
-
Target
3ba352819c7abd6700100363b3f63e070549433564bd7636cdd0cf53b6356dc2N
-
Size
802KB
-
MD5
280846047c1c992d510de8e8e55c59d0
-
SHA1
dd90f1a5223c6a92679c138b88531c7ed13763c2
-
SHA256
3ba352819c7abd6700100363b3f63e070549433564bd7636cdd0cf53b6356dc2
-
SHA512
badd464536ca06951298b31637f4b081671c18f9c4280490954016a9f6811b29334e32db3163156275f86715a4366ce49f265eec5ddb6e02f07c0d4c1137c63d
-
SSDEEP
24576:hYJW0Qyhwv6LcDU99IFkuyvo9rVzk6BQYYij2B0YY:4Zwv6LYU9ebyvolL2iYY
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-