General
-
Target
fbdd9415cb81b05718eb989fc29ac96e76e6349515f2eec3b30899e041d06f0b.exe
-
Size
777KB
-
Sample
241113-xsnxqa1laj
-
MD5
f899d0e408905550dbc0d11a29a7f014
-
SHA1
547d454a658393bb5fc3479333cde132acbeadd8
-
SHA256
fbdd9415cb81b05718eb989fc29ac96e76e6349515f2eec3b30899e041d06f0b
-
SHA512
12bf4021bcfc9c8c7c41df9f92d14440d0776ea69a4fcf14dac08b0090545404f7c2a08e26b6a4369835abb270b4cda11935a067f88f5e0f61e6500cc9fb5988
-
SSDEEP
12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCZxHrPKIawhJk:uRmJkcoQricOIQxiZY1iaCZxHriIawfk
Static task
static1
Behavioral task
behavioral1
Sample
fbdd9415cb81b05718eb989fc29ac96e76e6349515f2eec3b30899e041d06f0b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fbdd9415cb81b05718eb989fc29ac96e76e6349515f2eec3b30899e041d06f0b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.vagautocenter.nl - Port:
587 - Username:
[email protected] - Password:
[email protected] - Email To:
[email protected]
Targets
-
-
Target
fbdd9415cb81b05718eb989fc29ac96e76e6349515f2eec3b30899e041d06f0b.exe
-
Size
777KB
-
MD5
f899d0e408905550dbc0d11a29a7f014
-
SHA1
547d454a658393bb5fc3479333cde132acbeadd8
-
SHA256
fbdd9415cb81b05718eb989fc29ac96e76e6349515f2eec3b30899e041d06f0b
-
SHA512
12bf4021bcfc9c8c7c41df9f92d14440d0776ea69a4fcf14dac08b0090545404f7c2a08e26b6a4369835abb270b4cda11935a067f88f5e0f61e6500cc9fb5988
-
SSDEEP
12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCZxHrPKIawhJk:uRmJkcoQricOIQxiZY1iaCZxHriIawfk
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-