General
-
Target
H3xtNAMuZJNTvr2.exe
-
Size
789KB
-
Sample
241104-r99b4atrdm
-
MD5
04c1bc77fc4a34e3c4971ca8738a1057
-
SHA1
c59790ad48b3e8579aef6ef7432b4871d60c0f66
-
SHA256
6a34640515e03a83e2f55398cd4803fdab793a9d901ec4e4748374c9a9cf42ed
-
SHA512
550b8dbc3ef9bddd9b0bd83b82906510c3aaa4328eb841458006f6553b8ce806eb8fac55ea1a52ea01ceee34c4e57fbfeb8c4d05c641aac2c381003b72dad866
-
SSDEEP
24576:V5U/fjDNBi9oLReFmBOzYsjYs+a7qIMk:k/NBMFVn/+a/Mk
Static task
static1
Behavioral task
behavioral1
Sample
H3xtNAMuZJNTvr2.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
H3xtNAMuZJNTvr2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.wxtp.store - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Targets
-
-
Target
H3xtNAMuZJNTvr2.exe
-
Size
789KB
-
MD5
04c1bc77fc4a34e3c4971ca8738a1057
-
SHA1
c59790ad48b3e8579aef6ef7432b4871d60c0f66
-
SHA256
6a34640515e03a83e2f55398cd4803fdab793a9d901ec4e4748374c9a9cf42ed
-
SHA512
550b8dbc3ef9bddd9b0bd83b82906510c3aaa4328eb841458006f6553b8ce806eb8fac55ea1a52ea01ceee34c4e57fbfeb8c4d05c641aac2c381003b72dad866
-
SSDEEP
24576:V5U/fjDNBi9oLReFmBOzYsjYs+a7qIMk:k/NBMFVn/+a/Mk
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-