General
-
Target
a4b35cf0c6b13161e66207d61603c2f19c691c557e2a7f189b8f67460a757e40.exe
-
Size
269KB
-
Sample
241106-dxw94stepf
-
MD5
be76fcc236b9cf3ba5dcc13233b902ca
-
SHA1
af085216482dd8530fef54aa859e52aa48ad2ec7
-
SHA256
a4b35cf0c6b13161e66207d61603c2f19c691c557e2a7f189b8f67460a757e40
-
SHA512
c35dbc7d5acfa39dd92cbe705d5ef262a0421e25502613146910fe364b1d70103ef09baa399fe5ef1a312f6e2be4d741a3e5b438684f6894620100541bac6503
-
SSDEEP
3072:9pdjv4WNr0HTfNUWwB0XpNTjZgAOQ5pH1/Up6ebfcsoqXYTVgHilbbY:g3XibPYb
Behavioral task
behavioral1
Sample
a4b35cf0c6b13161e66207d61603c2f19c691c557e2a7f189b8f67460a757e40.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a4b35cf0c6b13161e66207d61603c2f19c691c557e2a7f189b8f67460a757e40.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.recsb.com - Port:
587 - Username:
[email protected] - Password:
1=vI*r6^ - Email To:
[email protected]
Targets
-
-
Target
a4b35cf0c6b13161e66207d61603c2f19c691c557e2a7f189b8f67460a757e40.exe
-
Size
269KB
-
MD5
be76fcc236b9cf3ba5dcc13233b902ca
-
SHA1
af085216482dd8530fef54aa859e52aa48ad2ec7
-
SHA256
a4b35cf0c6b13161e66207d61603c2f19c691c557e2a7f189b8f67460a757e40
-
SHA512
c35dbc7d5acfa39dd92cbe705d5ef262a0421e25502613146910fe364b1d70103ef09baa399fe5ef1a312f6e2be4d741a3e5b438684f6894620100541bac6503
-
SSDEEP
3072:9pdjv4WNr0HTfNUWwB0XpNTjZgAOQ5pH1/Up6ebfcsoqXYTVgHilbbY:g3XibPYb
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-