General
-
Target
f2315daf1ccd6e570b919e68e41d334709d97e004db40b4dbbc84dfe97119e81
-
Size
671KB
-
Sample
241104-p3kn2syqgv
-
MD5
e794911190369607fd651430b5dd81ee
-
SHA1
3e5f99eb9731bea70e1475c315146e962a0ad2b5
-
SHA256
f2315daf1ccd6e570b919e68e41d334709d97e004db40b4dbbc84dfe97119e81
-
SHA512
43a046c25a7370dd654c246f9c0a042f105ba7578bde702fb3746abe8cd1d37853d0639af180aae086e40f79d5864a121f0fd8d9637a1d95d0b79169010dd771
-
SSDEEP
12288:pe/tDBwenJ6H3B6lUyEJU8HMN/WAqcxj54ft/zv5VbakUdck2WOE4eD7E:cV9HsXqoJhsJWALxj5oRvGdccXD7E
Static task
static1
Behavioral task
behavioral1
Sample
LP.O. No. 0398.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
LP.O. No. 0398.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot6107929879:AAHV6JwXs7rcYzMGLe3_opR5_gdKAC16Ye4/sendMessage?chat_id=6311012313
Targets
-
-
Target
LP.O. No. 0398.com
-
Size
790KB
-
MD5
0279c0c1f0798bf1f7fbe610bb8c45e5
-
SHA1
8caa2af8e1107aa9d12c24e30169d987e65ce7ae
-
SHA256
85934bd9ea8427058f9e56a4441068c0f7dbac8746ff49e89c792448e6b0a3db
-
SHA512
5176b0e7c4984152cc467dbeaf6db2d7f7cf3f55d38c68270272c21d8511dddfbc7a6d76d10f3a6d4d71768bd85bcc639b6bf6e24d480c67bbb02c468ba33f07
-
SSDEEP
12288:0lxgTghZfm0Cu+e3JWH3BkOdHk13b8In5T6dJ3NDh/fP/zv5VHakl6YmbXGV:mEg/fj1UXGOdc3QI5Oz3vnzv7i
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-