General
-
Target
f2b4cbf30c6bb887655afe52c602d512221fdd185718786972f4cccdb2d0d04d
-
Size
609KB
-
Sample
241127-sapzvavjep
-
MD5
f943a1e32ea5f0c75b0fb257bc1723d9
-
SHA1
ca1abe785f06f5cd3e7412bf23e9549fef0da702
-
SHA256
f2b4cbf30c6bb887655afe52c602d512221fdd185718786972f4cccdb2d0d04d
-
SHA512
09fd65772dd4d2a9ac9eec31224d54edc66de7e30e7a7a83f622751e1167ae6fc97dde8b844f23a4e1aaf302128e6343d9ca45e1554524e4bb60047045233141
-
SSDEEP
12288:5vv10okrtvuIJvTgIwIuj7me86y1ke9GEoM0Tya/kQIDPI:dWokrtvJJvTZuj6xRkXEuTyVQIDPI
Static task
static1
Behavioral task
behavioral1
Sample
PO#I-23-00007.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
PO#I-23-00007.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7567650575:AAHvGGF6TZiX_cMd8iYGZUXmOL-zDO7vZNI/sendMessage?chat_id=7654658491
Targets
-
-
Target
PO#I-23-00007.exe
-
Size
1.0MB
-
MD5
fcf9d6b4116b8ed364365276d6e59e1b
-
SHA1
fc3f2846ae840756415e05ecbc4d8972af0c29d1
-
SHA256
a43a19822df06a57655413a8bb229547212eedd3b5271e3f4890212bbda5ceb0
-
SHA512
72e5ad59ac233d8566f5fd2c09c9d2a63557da59127328b1736eb1abc20e0c2066fb5ec8f670743266562ab93c9f30e1d0d47738c5729048a3cd41ccad962ee2
-
SSDEEP
12288:dtb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgamTdAM8Tyarg0Am6A:dtb20pkaCqT5TBWgNQ7a+d+Tyd0Am6A
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-