General
-
Target
0f4ab8526c11090dbf09fd353384e14cf3af8c40646fb7cd67810feda230bae0.exe
-
Size
372KB
-
Sample
241128-clgvlszrgw
-
MD5
b6cc16fae7d4f3ce14186b64a470bf8b
-
SHA1
f12cad09a8680cfdad9b917a65f14a62e1d24ee1
-
SHA256
0f4ab8526c11090dbf09fd353384e14cf3af8c40646fb7cd67810feda230bae0
-
SHA512
462ee669d6d8b83d15c8075dbb598677671d2c024341bf6813229a09a9d587a0b73386c96c96f0c5092a6d14e6175c120e43e43289b014477b38033a4b92bb2d
-
SSDEEP
6144:D3mVSTcqfFrDOJfSLTJfJQ/zOjffRzF1wwJrDA0gbSyZDSQOwfPnRjH/Zc3Ys+q1:YSrt+K/JRzF1wwJrDA0gbfcEfvRjBcPu
Static task
static1
Behavioral task
behavioral1
Sample
0f4ab8526c11090dbf09fd353384e14cf3af8c40646fb7cd67810feda230bae0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f4ab8526c11090dbf09fd353384e14cf3af8c40646fb7cd67810feda230bae0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7925978922:AAECifW4bGh1utN6hfeEFfhRG36owOqQd_I/sendMessage?chat_id=7373943284
Targets
-
-
Target
0f4ab8526c11090dbf09fd353384e14cf3af8c40646fb7cd67810feda230bae0.exe
-
Size
372KB
-
MD5
b6cc16fae7d4f3ce14186b64a470bf8b
-
SHA1
f12cad09a8680cfdad9b917a65f14a62e1d24ee1
-
SHA256
0f4ab8526c11090dbf09fd353384e14cf3af8c40646fb7cd67810feda230bae0
-
SHA512
462ee669d6d8b83d15c8075dbb598677671d2c024341bf6813229a09a9d587a0b73386c96c96f0c5092a6d14e6175c120e43e43289b014477b38033a4b92bb2d
-
SSDEEP
6144:D3mVSTcqfFrDOJfSLTJfJQ/zOjffRzF1wwJrDA0gbSyZDSQOwfPnRjH/Zc3Ys+q1:YSrt+K/JRzF1wwJrDA0gbfcEfvRjBcPu
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-