General
-
Target
6c68fda322195cbe8adc1bfb3e111555300ce387dd3bc59236c5f7b6d18a4b1e
-
Size
1.2MB
-
Sample
241106-ksx46swncw
-
MD5
2a2555304ebd2fa0755a6831080259df
-
SHA1
bf63f44fd3ddf40b91f9dad3c68f3c8a057806ec
-
SHA256
6c68fda322195cbe8adc1bfb3e111555300ce387dd3bc59236c5f7b6d18a4b1e
-
SHA512
d03e74ebf880260ad4b8f6f1d95e02fc7ee73a96fba758723176a5f20590cb3d004c503b493a26bfc03cb421a3c22ca7bbee3d6a53ea927898fb1dcb245c417f
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLiKpEgA0YA8kpztWcY:f3v+7/5QLi3gA0YAVW
Static task
static1
Behavioral task
behavioral1
Sample
6c68fda322195cbe8adc1bfb3e111555300ce387dd3bc59236c5f7b6d18a4b1e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6c68fda322195cbe8adc1bfb3e111555300ce387dd3bc59236c5f7b6d18a4b1e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.ujexchange.com - Port:
587 - Username:
[email protected] - Password:
UJ@2022 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.ujexchange.com - Port:
587 - Username:
[email protected] - Password:
UJ@2022
Targets
-
-
Target
6c68fda322195cbe8adc1bfb3e111555300ce387dd3bc59236c5f7b6d18a4b1e
-
Size
1.2MB
-
MD5
2a2555304ebd2fa0755a6831080259df
-
SHA1
bf63f44fd3ddf40b91f9dad3c68f3c8a057806ec
-
SHA256
6c68fda322195cbe8adc1bfb3e111555300ce387dd3bc59236c5f7b6d18a4b1e
-
SHA512
d03e74ebf880260ad4b8f6f1d95e02fc7ee73a96fba758723176a5f20590cb3d004c503b493a26bfc03cb421a3c22ca7bbee3d6a53ea927898fb1dcb245c417f
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLiKpEgA0YA8kpztWcY:f3v+7/5QLi3gA0YAVW
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-