General
-
Target
81e019eec1b1f11c799784692f81a936c003371874b968409923517bab7b70ac
-
Size
3.0MB
-
Sample
241031-rahebszemj
-
MD5
9e1f6833062853fe34cf620511b08662
-
SHA1
9f409adb2ddc3a06f1b73b888d6649d4bdaddee7
-
SHA256
81e019eec1b1f11c799784692f81a936c003371874b968409923517bab7b70ac
-
SHA512
f336d99d4adcf640584d6cd72293d10bc2372d66e9e254f9f1dc17208e8ca8305f7d27522639b75cd527ee407dcf7adae64c2920e4d7921018ab9099ad2c7bd5
-
SSDEEP
12288:bRW0lR858YtZX9UVJd+ihYsZJQM9ZLCIyEaSs3Wuk7WtbQw0QLcVG7xMHZ:bRW0lPWZG9Pjdtv+3WdUd0Y5xsZ
Static task
static1
Behavioral task
behavioral1
Sample
81e019eec1b1f11c799784692f81a936c003371874b968409923517bab7b70ac.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
81e019eec1b1f11c799784692f81a936c003371874b968409923517bab7b70ac.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7580957702:AAF09QqagTzh-M7zSCZovqxkmwhkdAGG1yI/sendMessage?chat_id=7105655241
Targets
-
-
Target
81e019eec1b1f11c799784692f81a936c003371874b968409923517bab7b70ac
-
Size
3.0MB
-
MD5
9e1f6833062853fe34cf620511b08662
-
SHA1
9f409adb2ddc3a06f1b73b888d6649d4bdaddee7
-
SHA256
81e019eec1b1f11c799784692f81a936c003371874b968409923517bab7b70ac
-
SHA512
f336d99d4adcf640584d6cd72293d10bc2372d66e9e254f9f1dc17208e8ca8305f7d27522639b75cd527ee407dcf7adae64c2920e4d7921018ab9099ad2c7bd5
-
SSDEEP
12288:bRW0lR858YtZX9UVJd+ihYsZJQM9ZLCIyEaSs3Wuk7WtbQw0QLcVG7xMHZ:bRW0lPWZG9Pjdtv+3WdUd0Y5xsZ
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-