General
-
Target
67f3a060e7b516998639254fe1ced14161e1657dc53e520ab95be98bb69877c4
-
Size
873KB
-
Sample
241128-3kj7fszrak
-
MD5
8e7c72bef03088d7b6ff500dbab8d60e
-
SHA1
9bde3a14edc19008a221e857afb87c7b03c06474
-
SHA256
67f3a060e7b516998639254fe1ced14161e1657dc53e520ab95be98bb69877c4
-
SHA512
2862664f63e2bdc7a9026f01b6cac145dca1a17c6afbc9227cb36c493a3cda6a0eb3b6c1e7b23790a582ca0cb63e6a84ac233c016479142cc9675510f8717bf9
-
SSDEEP
24576:1oBDwfsUIYrTQf45WfFNFflEvIldWX6bugTf:CBDWsAof4AfFNFfl0IWpgT
Static task
static1
Behavioral task
behavioral1
Sample
67f3a060e7b516998639254fe1ced14161e1657dc53e520ab95be98bb69877c4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
67f3a060e7b516998639254fe1ced14161e1657dc53e520ab95be98bb69877c4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
SOCAG3_314$%] - Email To:
[email protected]
Targets
-
-
Target
67f3a060e7b516998639254fe1ced14161e1657dc53e520ab95be98bb69877c4
-
Size
873KB
-
MD5
8e7c72bef03088d7b6ff500dbab8d60e
-
SHA1
9bde3a14edc19008a221e857afb87c7b03c06474
-
SHA256
67f3a060e7b516998639254fe1ced14161e1657dc53e520ab95be98bb69877c4
-
SHA512
2862664f63e2bdc7a9026f01b6cac145dca1a17c6afbc9227cb36c493a3cda6a0eb3b6c1e7b23790a582ca0cb63e6a84ac233c016479142cc9675510f8717bf9
-
SSDEEP
24576:1oBDwfsUIYrTQf45WfFNFflEvIldWX6bugTf:CBDWsAof4AfFNFfl0IWpgT
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-