General
-
Target
39a65d909ebc773855351aa58e95b192150baf164e6165c633a6321156452baf
-
Size
1019KB
-
Sample
241115-ympsha1cja
-
MD5
28664f8d0784c730868f15becf318efe
-
SHA1
080a7a0e5f19cc222624f9cf10a2e6df1c52d726
-
SHA256
39a65d909ebc773855351aa58e95b192150baf164e6165c633a6321156452baf
-
SHA512
bb93d1a04b7352f8c510dff40e77200a1b876c1c4117a811cb255160bc00ee2eda82b7c6e000d9247202b23e89f6021855a79981304f9c8b7131375e5078ade1
-
SSDEEP
24576:HAHnh+eWsN3skA4RV1Hom2KXMmHawap00a6kZ/K5:6h+ZkldoPK8YawuBk6
Static task
static1
Behavioral task
behavioral1
Sample
39a65d909ebc773855351aa58e95b192150baf164e6165c633a6321156452baf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39a65d909ebc773855351aa58e95b192150baf164e6165c633a6321156452baf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7563060616:AAGgGu8pocoVNLzoow0Ge2U2GVDS9nDmL6Q/sendMessage?chat_id=7222025033
Targets
-
-
Target
39a65d909ebc773855351aa58e95b192150baf164e6165c633a6321156452baf
-
Size
1019KB
-
MD5
28664f8d0784c730868f15becf318efe
-
SHA1
080a7a0e5f19cc222624f9cf10a2e6df1c52d726
-
SHA256
39a65d909ebc773855351aa58e95b192150baf164e6165c633a6321156452baf
-
SHA512
bb93d1a04b7352f8c510dff40e77200a1b876c1c4117a811cb255160bc00ee2eda82b7c6e000d9247202b23e89f6021855a79981304f9c8b7131375e5078ade1
-
SSDEEP
24576:HAHnh+eWsN3skA4RV1Hom2KXMmHawap00a6kZ/K5:6h+ZkldoPK8YawuBk6
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-