General
-
Target
28801553236f9b3c3b5bac061244272e338e9108848a843fcf6a74ba3ce48037.exe
-
Size
3.3MB
-
Sample
241119-vvsbtatmak
-
MD5
7d1227ee01425e0fff15834068d02af5
-
SHA1
f01b9efaf12aabe2c9d2f173602320d8d416bd88
-
SHA256
28801553236f9b3c3b5bac061244272e338e9108848a843fcf6a74ba3ce48037
-
SHA512
1c9dea1619908496cd2a6feaa48f14162edb4c2f9e9b86d470aeeb8d21b6acb5d6e01420092a3b30ec4ed53eb78f5f461dc061f597d71d1caa037a4db861bbff
-
SSDEEP
12288:BjvjM34XUe5Z20BXdHhOoaVUQqiJL2Lchnlk8lq7oIqvdkDykVHWCaDa:BjrdUOY0phAoaVUQn2LcHk8lq7oIII3P
Static task
static1
Behavioral task
behavioral1
Sample
28801553236f9b3c3b5bac061244272e338e9108848a843fcf6a74ba3ce48037.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
28801553236f9b3c3b5bac061244272e338e9108848a843fcf6a74ba3ce48037.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.singhalenterprise.com - Port:
587 - Username:
[email protected] - Password:
balkishan@123
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.singhalenterprise.com - Port:
587 - Username:
[email protected] - Password:
balkishan@123 - Email To:
[email protected]
Targets
-
-
Target
28801553236f9b3c3b5bac061244272e338e9108848a843fcf6a74ba3ce48037.exe
-
Size
3.3MB
-
MD5
7d1227ee01425e0fff15834068d02af5
-
SHA1
f01b9efaf12aabe2c9d2f173602320d8d416bd88
-
SHA256
28801553236f9b3c3b5bac061244272e338e9108848a843fcf6a74ba3ce48037
-
SHA512
1c9dea1619908496cd2a6feaa48f14162edb4c2f9e9b86d470aeeb8d21b6acb5d6e01420092a3b30ec4ed53eb78f5f461dc061f597d71d1caa037a4db861bbff
-
SSDEEP
12288:BjvjM34XUe5Z20BXdHhOoaVUQqiJL2Lchnlk8lq7oIqvdkDykVHWCaDa:BjrdUOY0phAoaVUQn2LcHk8lq7oIII3P
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-