General
-
Target
1730880308a25cd41259538643a6a02b355f33de1f56cb7e6d874f22aad09eac2596439da1840.dat-decoded.exe
-
Size
202KB
-
Sample
241106-jzeezaynaq
-
MD5
239fc62337835951e1d6b9e5ff4cc422
-
SHA1
8a3e13851355e73b6e96a5601b83edc29e646fca
-
SHA256
e76d9a2e874a46b8ee74611cc3985a67972b73ce24fc1c8c0962e1a30f3f8c47
-
SHA512
5072063b48d70711681d2bc237ea6906ef0bbb737b170d81ec3cba185d97ee0603f8117c3503ab6fadc02ae53087c5d31d148c934f903ccc2988f0f8a1d199a8
-
SSDEEP
3072:YDKW1LgppLRHMY0TBfJvjcTp5XsnDOgZ7NcSubXwMoQEYuB7bYS:YDKW1Lgbdl0TBBvjc/snCimLwxQ1upbh
Static task
static1
Behavioral task
behavioral1
Sample
1730880308a25cd41259538643a6a02b355f33de1f56cb7e6d874f22aad09eac2596439da1840.dat-decoded.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1730880308a25cd41259538643a6a02b355f33de1f56cb7e6d874f22aad09eac2596439da1840.dat-decoded.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Targets
-
-
Target
1730880308a25cd41259538643a6a02b355f33de1f56cb7e6d874f22aad09eac2596439da1840.dat-decoded.exe
-
Size
202KB
-
MD5
239fc62337835951e1d6b9e5ff4cc422
-
SHA1
8a3e13851355e73b6e96a5601b83edc29e646fca
-
SHA256
e76d9a2e874a46b8ee74611cc3985a67972b73ce24fc1c8c0962e1a30f3f8c47
-
SHA512
5072063b48d70711681d2bc237ea6906ef0bbb737b170d81ec3cba185d97ee0603f8117c3503ab6fadc02ae53087c5d31d148c934f903ccc2988f0f8a1d199a8
-
SSDEEP
3072:YDKW1LgppLRHMY0TBfJvjcTp5XsnDOgZ7NcSubXwMoQEYuB7bYS:YDKW1Lgbdl0TBBvjc/snCimLwxQ1upbh
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-