General
-
Target
73cce3e987a9e95872a5e0f81ab0353efe9bf9febffc066e4f997954587d3187N.exe
-
Size
756KB
-
Sample
241117-sn41xsxkfl
-
MD5
f70ff8ce7c18f3189f9c924754bf7f30
-
SHA1
2899819702a6eb35e7003cdf761da79e94a6d629
-
SHA256
73cce3e987a9e95872a5e0f81ab0353efe9bf9febffc066e4f997954587d3187
-
SHA512
7c6af03dcc52d0c798d87bce286b038782a3658a2884e131020037845b80e73f7db7cd5f59e48f317b6cb9dfc2fb61337b32a1665dd5509259b1cedfaeed3d06
-
SSDEEP
12288:l2+nSPz5JA/EME8jGql7WV1OaTpFJKoewYlfM9D9HFu4:noz5m/EJz+FaTEo7Yl4DPu4
Static task
static1
Behavioral task
behavioral1
Sample
73cce3e987a9e95872a5e0f81ab0353efe9bf9febffc066e4f997954587d3187N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
73cce3e987a9e95872a5e0f81ab0353efe9bf9febffc066e4f997954587d3187N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
}7KaoV%+ZDr75*4004 - Email To:
[email protected]
Targets
-
-
Target
73cce3e987a9e95872a5e0f81ab0353efe9bf9febffc066e4f997954587d3187N.exe
-
Size
756KB
-
MD5
f70ff8ce7c18f3189f9c924754bf7f30
-
SHA1
2899819702a6eb35e7003cdf761da79e94a6d629
-
SHA256
73cce3e987a9e95872a5e0f81ab0353efe9bf9febffc066e4f997954587d3187
-
SHA512
7c6af03dcc52d0c798d87bce286b038782a3658a2884e131020037845b80e73f7db7cd5f59e48f317b6cb9dfc2fb61337b32a1665dd5509259b1cedfaeed3d06
-
SSDEEP
12288:l2+nSPz5JA/EME8jGql7WV1OaTpFJKoewYlfM9D9HFu4:noz5m/EJz+FaTEo7Yl4DPu4
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-