General
-
Target
cb4635bc37189a8c926cd1542e767eae5b9f5f9dbe7ce25b141dbf6902376ee4
-
Size
626KB
-
Sample
241031-rccxma1ler
-
MD5
4244cbe1fea11815a775251d08cadff2
-
SHA1
fa70311069750cc865c9e1aa3aa80a4764494bf6
-
SHA256
cb4635bc37189a8c926cd1542e767eae5b9f5f9dbe7ce25b141dbf6902376ee4
-
SHA512
327f5832422729cb4697a2afc64b6e3004123b0283ad8838360a9c171df4858de98eda198e9579d64d14c08edc4ac1a3f4b7857ceaa48dda4e493c11773e4116
-
SSDEEP
12288:qNR8r8YnZr9URJd+wh6WZJQMFZLCIyE2SI3Wuk/WtbUwiQLYVG7XBYqV:qNvSZQRFjlZvK3WlU5iYdXBYqV
Static task
static1
Behavioral task
behavioral1
Sample
31_10_2024_Dönemi_MEVDUAT Ekstre Bilgiler.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
31_10_2024_Dönemi_MEVDUAT Ekstre Bilgiler.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7580957702:AAF09QqagTzh-M7zSCZovqxkmwhkdAGG1yI/sendMessage?chat_id=7105655241
Targets
-
-
Target
31_10_2024_Dönemi_MEVDUAT Ekstre Bilgiler.exe
-
Size
3.0MB
-
MD5
9e1f6833062853fe34cf620511b08662
-
SHA1
9f409adb2ddc3a06f1b73b888d6649d4bdaddee7
-
SHA256
81e019eec1b1f11c799784692f81a936c003371874b968409923517bab7b70ac
-
SHA512
f336d99d4adcf640584d6cd72293d10bc2372d66e9e254f9f1dc17208e8ca8305f7d27522639b75cd527ee407dcf7adae64c2920e4d7921018ab9099ad2c7bd5
-
SSDEEP
12288:bRW0lR858YtZX9UVJd+ihYsZJQM9ZLCIyEaSs3Wuk7WtbQw0QLcVG7xMHZ:bRW0lPWZG9Pjdtv+3WdUd0Y5xsZ
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-