General
-
Target
51f52b4829b1930c3d4781e63ac08ccb74840c9b901b46b9f35274803e6d5571
-
Size
268KB
-
Sample
241115-w7wqfayld1
-
MD5
2ba023727b7a6399471d26a38f26695a
-
SHA1
69d719ca185d62a737a2503a45b1b04cd097e190
-
SHA256
51f52b4829b1930c3d4781e63ac08ccb74840c9b901b46b9f35274803e6d5571
-
SHA512
8c503e6b5492b5a9f0f102bb30c34ba0c6d33af46d39edf7aa07429a07ae7720b0ec61a4fd1280d5ca4899e848cb436e1d3633b64f0c83a01e75e4be1f848ed9
-
SSDEEP
3072:8icrbDkA33F1ykglgPXQdwflU4uSL12ZazfbIrTu5Yso2UY/Vg4imbbY:YudZaDbNRFb
Behavioral task
behavioral1
Sample
51f52b4829b1930c3d4781e63ac08ccb74840c9b901b46b9f35274803e6d5571.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
51f52b4829b1930c3d4781e63ac08ccb74840c9b901b46b9f35274803e6d5571.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
(lqKKXb5 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
(lqKKXb5
Targets
-
-
Target
51f52b4829b1930c3d4781e63ac08ccb74840c9b901b46b9f35274803e6d5571
-
Size
268KB
-
MD5
2ba023727b7a6399471d26a38f26695a
-
SHA1
69d719ca185d62a737a2503a45b1b04cd097e190
-
SHA256
51f52b4829b1930c3d4781e63ac08ccb74840c9b901b46b9f35274803e6d5571
-
SHA512
8c503e6b5492b5a9f0f102bb30c34ba0c6d33af46d39edf7aa07429a07ae7720b0ec61a4fd1280d5ca4899e848cb436e1d3633b64f0c83a01e75e4be1f848ed9
-
SSDEEP
3072:8icrbDkA33F1ykglgPXQdwflU4uSL12ZazfbIrTu5Yso2UY/Vg4imbbY:YudZaDbNRFb
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-