General
-
Target
f3d05e8f30cd15fea3f1e3d11892965d34324dad2d080f38a400d0ee806708d0.exe
-
Size
270KB
-
Sample
241203-q1s33stkej
-
MD5
6b8f4ff53e01a135d9a542c4a889af70
-
SHA1
4e313e98693eecea02940c6c2cc01d3d389891df
-
SHA256
f3d05e8f30cd15fea3f1e3d11892965d34324dad2d080f38a400d0ee806708d0
-
SHA512
10606d852ae4c682872950fe12b83f7cd5c84d61f93a19a43fe6c7da39a72b07de082e5efdcf8d740637f0fedc7a5ee154d448e65e6b748352dfc594113acf7a
-
SSDEEP
3072:mmIPNGzfTSwWqNBy6ky6Xs2deEBvKrzz6pHYR8rs3+Pbfo4EBsjLFYTVgai7bbY:VjiMhWbdBb
Behavioral task
behavioral1
Sample
f3d05e8f30cd15fea3f1e3d11892965d34324dad2d080f38a400d0ee806708d0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f3d05e8f30cd15fea3f1e3d11892965d34324dad2d080f38a400d0ee806708d0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7546896793:AAGEGIt0RtLapwHQA3llERLQC1AMW8eOKsI/sendMessage?chat_id=7941049362
Targets
-
-
Target
f3d05e8f30cd15fea3f1e3d11892965d34324dad2d080f38a400d0ee806708d0.exe
-
Size
270KB
-
MD5
6b8f4ff53e01a135d9a542c4a889af70
-
SHA1
4e313e98693eecea02940c6c2cc01d3d389891df
-
SHA256
f3d05e8f30cd15fea3f1e3d11892965d34324dad2d080f38a400d0ee806708d0
-
SHA512
10606d852ae4c682872950fe12b83f7cd5c84d61f93a19a43fe6c7da39a72b07de082e5efdcf8d740637f0fedc7a5ee154d448e65e6b748352dfc594113acf7a
-
SSDEEP
3072:mmIPNGzfTSwWqNBy6ky6Xs2deEBvKrzz6pHYR8rs3+Pbfo4EBsjLFYTVgai7bbY:VjiMhWbdBb
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-