General
-
Target
30a59bea045a1d5279f62a8ade0daa242dafc5440540f29032f91f33c074caa5N
-
Size
1.1MB
-
Sample
241109-j4nt7s1dlc
-
MD5
6892e3ff6b1ce916d72d4b8af65f88e0
-
SHA1
c0713edcf24a2a19491991467e61161b11aa296e
-
SHA256
30a59bea045a1d5279f62a8ade0daa242dafc5440540f29032f91f33c074caa5
-
SHA512
c525134479e7762018e6aee112fd0970d5d15c143037a354c34bc94a1e73c4a7e79e1cf71a9867d40d0c506942dea71e5fb55ed715441d7155344adef4d7f896
-
SSDEEP
24576:jiUmSB/o5d1ubcvTea/PYr9+0z8LyHJUWjn4SWyINEr9tOXvnrCZ/8evS:j/mU/ohubcvTea/PYr9+0YuHOW7VINaD
Behavioral task
behavioral1
Sample
30a59bea045a1d5279f62a8ade0daa242dafc5440540f29032f91f33c074caa5N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
30a59bea045a1d5279f62a8ade0daa242dafc5440540f29032f91f33c074caa5N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.fr - Port:
587 - Username:
[email protected] - Password:
Jc.2o3o@ - Email To:
[email protected]
Targets
-
-
Target
30a59bea045a1d5279f62a8ade0daa242dafc5440540f29032f91f33c074caa5N
-
Size
1.1MB
-
MD5
6892e3ff6b1ce916d72d4b8af65f88e0
-
SHA1
c0713edcf24a2a19491991467e61161b11aa296e
-
SHA256
30a59bea045a1d5279f62a8ade0daa242dafc5440540f29032f91f33c074caa5
-
SHA512
c525134479e7762018e6aee112fd0970d5d15c143037a354c34bc94a1e73c4a7e79e1cf71a9867d40d0c506942dea71e5fb55ed715441d7155344adef4d7f896
-
SSDEEP
24576:jiUmSB/o5d1ubcvTea/PYr9+0z8LyHJUWjn4SWyINEr9tOXvnrCZ/8evS:j/mU/ohubcvTea/PYr9+0YuHOW7VINaD
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-