General
-
Target
Maosh qog'ozi.rar
-
Size
220KB
-
Sample
241215-s3nbqaylds
-
MD5
284bcf3a08a8115546dbea1d7fbfcb8e
-
SHA1
737caceda807e3579025521dd649ece30473ff9a
-
SHA256
c3c2a267fbdc287aad468f00d09dabcc330ddbcc639bed0508fba38f645cf3c0
-
SHA512
26e0da8f3284de93094441e65b5a5228d6988941395c5da2d73da4f14db7f5a60dc5247d515526e2742627a55f5e50eb2f0811afb80cbba868b20591b04ba8eb
-
SSDEEP
6144:cPjv2XG1j/pAnV4ZBdd0RgFlg7IK8KEVh5Xrg22Q:I72kjunKZB79CGlXrg22Q
Static task
static1
Behavioral task
behavioral1
Sample
Maosh qog'ozi.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Maosh qog'ozi.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.hostinger.com - Port:
587 - Username:
[email protected] - Password:
eQ&vwpXMsK38 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.hostinger.com - Port:
587 - Username:
[email protected] - Password:
eQ&vwpXMsK38
Targets
-
-
Target
Maosh qog'ozi.exe
-
Size
357KB
-
MD5
7eaadf6469c409d04d372f3ae56ebf87
-
SHA1
9a21d453272387a014a47f843a3e495da11d1f74
-
SHA256
c9db49c9cc19516d4a95548d1ce4ce1f36df8c40e690c14bcb547ddb1e789bb1
-
SHA512
cfbf3b1c8cd0f5d57e0bebebbe7fe3abac73fe09854b8f26b5bd20c0413f786fb644f9d0c5f49bb6682e2a524ee34dc54dd95a80b752b5b47c05a88e5746077c
-
SSDEEP
6144:NoIwxcKWibHiyvLZo4kczch/to9QK5cNVIFRvCOaGrgXak+tkl0Wc:NbKW6hzZowBCGr4aztkN
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-