General
-
Target
edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N
-
Size
1.3MB
-
Sample
241106-1el3raxmfx
-
MD5
6dddf5c4823bc73c25d04605626fbad0
-
SHA1
c1a6bad0bd35de4ccaf70337ea697e92f9ff8fa2
-
SHA256
edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11
-
SHA512
1939d94219c8782d5269159050f18e151da07ff6a4d84c2463c015b731e680b501209f40cab48cc7d56940a1c23ad7ab6fb0032e475a37ff42efd3e6c3f5968f
-
SSDEEP
24576:+qDEvCTbMWu7rQYlBQcBiT6rprG8asH1I5+5QkhOH1o81c5rjD:+TvC/MTQYxsWR7asVI5++kIqku
Static task
static1
Behavioral task
behavioral1
Sample
edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7339564661:AAFzTB6gEWMndjXYyD5LCn17UEBISRR8wDI/sendMessage?chat_id=6443825857
Targets
-
-
Target
edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N
-
Size
1.3MB
-
MD5
6dddf5c4823bc73c25d04605626fbad0
-
SHA1
c1a6bad0bd35de4ccaf70337ea697e92f9ff8fa2
-
SHA256
edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11
-
SHA512
1939d94219c8782d5269159050f18e151da07ff6a4d84c2463c015b731e680b501209f40cab48cc7d56940a1c23ad7ab6fb0032e475a37ff42efd3e6c3f5968f
-
SSDEEP
24576:+qDEvCTbMWu7rQYlBQcBiT6rprG8asH1I5+5QkhOH1o81c5rjD:+TvC/MTQYxsWR7asVI5++kIqku
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-