General
-
Target
09e6fd65-9691-4eb8-e6f7-08dd0dce4a80.gz
-
Size
240KB
-
Sample
241205-jgg35s1jhk
-
MD5
433eab0a6440defff2889c24164ec8af
-
SHA1
5c98180cd51bf285782bcd27e4e4e6efff584089
-
SHA256
449b00d6aca53af24c348bcc96efc782ab99222a23abc9f15b4e4dd08844b802
-
SHA512
015cffafd99d48eba181df9a724825915642b749ba0e7b37c88734b7882d00ce1ee88dbf98201503ee4b36e012ed92c4277afd2c4c0c78540b2a3614ae3d69b3
-
SSDEEP
6144:15hhojmSGOAIeI/iLgKHlDiSWEXAD0lYE1qDR5oRq8l:nhSjqOfeUi1dVXAoYE1qDRCRq6
Static task
static1
Behavioral task
behavioral1
Sample
Po-5865A.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Po-5865A.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7925978922:AAECifW4bGh1utN6hfeEFfhRG36owOqQd_I/sendMessage?chat_id=7373943284
Targets
-
-
Target
Po-5865A.exe
-
Size
372KB
-
MD5
b6cc16fae7d4f3ce14186b64a470bf8b
-
SHA1
f12cad09a8680cfdad9b917a65f14a62e1d24ee1
-
SHA256
0f4ab8526c11090dbf09fd353384e14cf3af8c40646fb7cd67810feda230bae0
-
SHA512
462ee669d6d8b83d15c8075dbb598677671d2c024341bf6813229a09a9d587a0b73386c96c96f0c5092a6d14e6175c120e43e43289b014477b38033a4b92bb2d
-
SSDEEP
6144:D3mVSTcqfFrDOJfSLTJfJQ/zOjffRzF1wwJrDA0gbSyZDSQOwfPnRjH/Zc3Ys+q1:YSrt+K/JRzF1wwJrDA0gbfcEfvRjBcPu
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-