General
-
Target
2cabc41b8e44e0101ceca0923c6abbd2459aabeff1831d700f2cfd1e3487dc20
-
Size
725KB
-
Sample
241115-ww94pazalm
-
MD5
7f4ca79b19e121a41b7f608ba7e2b10c
-
SHA1
65e61000df8fc081736e24ced57b330f7dec81ad
-
SHA256
2cabc41b8e44e0101ceca0923c6abbd2459aabeff1831d700f2cfd1e3487dc20
-
SHA512
0a18703848fdea06ae5e8dd8d612f7d89b7419148042f757f5a06587eedc8c1021d183a9993af132579f74e95f42d3c3ea2d14cb558f3bb339095f191f783879
-
SSDEEP
12288:hGaDPw1Qk89TmyXwPzbR6ZejcbkGseAeiQ/2lWJcucw1EwglSNaN31wtay0iV3+4:h7Lw9gTFgRLj41SWaIcjUaNlwQy0Y+0f
Static task
static1
Behavioral task
behavioral1
Sample
2cabc41b8e44e0101ceca0923c6abbd2459aabeff1831d700f2cfd1e3487dc20.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2cabc41b8e44e0101ceca0923c6abbd2459aabeff1831d700f2cfd1e3487dc20.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
cp1.virtualine.org - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Targets
-
-
Target
2cabc41b8e44e0101ceca0923c6abbd2459aabeff1831d700f2cfd1e3487dc20
-
Size
725KB
-
MD5
7f4ca79b19e121a41b7f608ba7e2b10c
-
SHA1
65e61000df8fc081736e24ced57b330f7dec81ad
-
SHA256
2cabc41b8e44e0101ceca0923c6abbd2459aabeff1831d700f2cfd1e3487dc20
-
SHA512
0a18703848fdea06ae5e8dd8d612f7d89b7419148042f757f5a06587eedc8c1021d183a9993af132579f74e95f42d3c3ea2d14cb558f3bb339095f191f783879
-
SSDEEP
12288:hGaDPw1Qk89TmyXwPzbR6ZejcbkGseAeiQ/2lWJcucw1EwglSNaN31wtay0iV3+4:h7Lw9gTFgRLj41SWaIcjUaNlwQy0Y+0f
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-