General
-
Target
2024-12-19_d4539ea8b3689c0ac5a29bab586e6e5e_hiddentear
-
Size
673KB
-
Sample
241219-f84vfazrdv
-
MD5
d4539ea8b3689c0ac5a29bab586e6e5e
-
SHA1
58ec88f92ca5aa9d831a3ebc44de2c7342ecd695
-
SHA256
44a782c64fd57204e1c120a41ff620c28695edd03890c4e615503c044079720a
-
SHA512
682143a973b491353de78f9df22f4ee342332547041c52602f3c5c77cfba840d4842a9b4780aef6c3f08541a35b65158f4b128303d71527e4578c015f8ca1d12
-
SSDEEP
12288:HTYZll4HvBGpLkYYiUBfei3+/CKxaQ4o7YW+IMHeke6zp7Su8dAA:HTvPBGBZYbfRObieke6zpkA
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-19_d4539ea8b3689c0ac5a29bab586e6e5e_hiddentear.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-19_d4539ea8b3689c0ac5a29bab586e6e5e_hiddentear.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7269639819:AAEhAhUQSG9Gc6LkCmuL5O3qAZPTOuQdnsQ/sendMessage?chat_id=1984778786
Targets
-
-
Target
2024-12-19_d4539ea8b3689c0ac5a29bab586e6e5e_hiddentear
-
Size
673KB
-
MD5
d4539ea8b3689c0ac5a29bab586e6e5e
-
SHA1
58ec88f92ca5aa9d831a3ebc44de2c7342ecd695
-
SHA256
44a782c64fd57204e1c120a41ff620c28695edd03890c4e615503c044079720a
-
SHA512
682143a973b491353de78f9df22f4ee342332547041c52602f3c5c77cfba840d4842a9b4780aef6c3f08541a35b65158f4b128303d71527e4578c015f8ca1d12
-
SSDEEP
12288:HTYZll4HvBGpLkYYiUBfei3+/CKxaQ4o7YW+IMHeke6zp7Su8dAA:HTvPBGBZYbfRObieke6zpkA
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-