General
-
Target
d17b05e32a5fc1c63c16f4e03c290cd7e877e1c1ede63075c431a629ffa8a44b.exe
-
Size
620KB
-
Sample
241130-m3r21swpem
-
MD5
6b10db2cc19d6d1d006b7f7f2086aead
-
SHA1
a5766a12713c410c6f3f93489cf849397f1aa0c6
-
SHA256
d17b05e32a5fc1c63c16f4e03c290cd7e877e1c1ede63075c431a629ffa8a44b
-
SHA512
2d953e678157baa6302a4d81e8c0004e4fc343a9a2249954e2737cbdedef4bd5f5cc67d07b4b4532bd3cbcd73fed997cfaa07b9415064c08f035b07ccb90018a
-
SSDEEP
12288:MaF8kdTrFTFJ3b0pcVYGyRIDOYswSLQLMZg2zRP5cu4FhH610QKhe:M68iJbicVYGxDOp+M/hj4/HwIw
Static task
static1
Behavioral task
behavioral1
Sample
d17b05e32a5fc1c63c16f4e03c290cd7e877e1c1ede63075c431a629ffa8a44b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d17b05e32a5fc1c63c16f4e03c290cd7e877e1c1ede63075c431a629ffa8a44b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
panta.home.pl - Port:
587 - Username:
[email protected] - Password:
PANTA#Gda$2023 - Email To:
[email protected]
Targets
-
-
Target
d17b05e32a5fc1c63c16f4e03c290cd7e877e1c1ede63075c431a629ffa8a44b.exe
-
Size
620KB
-
MD5
6b10db2cc19d6d1d006b7f7f2086aead
-
SHA1
a5766a12713c410c6f3f93489cf849397f1aa0c6
-
SHA256
d17b05e32a5fc1c63c16f4e03c290cd7e877e1c1ede63075c431a629ffa8a44b
-
SHA512
2d953e678157baa6302a4d81e8c0004e4fc343a9a2249954e2737cbdedef4bd5f5cc67d07b4b4532bd3cbcd73fed997cfaa07b9415064c08f035b07ccb90018a
-
SSDEEP
12288:MaF8kdTrFTFJ3b0pcVYGyRIDOYswSLQLMZg2zRP5cu4FhH610QKhe:M68iJbicVYGxDOp+M/hj4/HwIw
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-