General
-
Target
2024-12-21_33eec03b8f5fef48079df422fdd0e351_hiddentear
-
Size
673KB
-
Sample
241221-bwxs5sypcs
-
MD5
33eec03b8f5fef48079df422fdd0e351
-
SHA1
fcefeb1854e2b2db2ab82338e8fadcc5636190b8
-
SHA256
70b4aca3d25ee89ae7511d1a478237b9d5069697e32291e9fba08faf048af0e1
-
SHA512
140b19c2b7abc0e14090a7818966ed016eaf1e556574db846f9313bb2496dced09d407d840c5fb1788c0e4222cc3ab695bd11df7a0b3bcc8bf4035fdc8af461b
-
SSDEEP
12288:kqWhGbN//QrmOT14HVTu5YxUhQzjakG2fC/WlyP3K6ufcFzfd8eVt6j1Zxxxxxxo:VXdOTiVTu5YxUhYjakG2f5l6puWd8kQX
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-21_33eec03b8f5fef48079df422fdd0e351_hiddentear.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-21_33eec03b8f5fef48079df422fdd0e351_hiddentear.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7269639819:AAEhAhUQSG9Gc6LkCmuL5O3qAZPTOuQdnsQ/sendMessage?chat_id=1984778786
Targets
-
-
Target
2024-12-21_33eec03b8f5fef48079df422fdd0e351_hiddentear
-
Size
673KB
-
MD5
33eec03b8f5fef48079df422fdd0e351
-
SHA1
fcefeb1854e2b2db2ab82338e8fadcc5636190b8
-
SHA256
70b4aca3d25ee89ae7511d1a478237b9d5069697e32291e9fba08faf048af0e1
-
SHA512
140b19c2b7abc0e14090a7818966ed016eaf1e556574db846f9313bb2496dced09d407d840c5fb1788c0e4222cc3ab695bd11df7a0b3bcc8bf4035fdc8af461b
-
SSDEEP
12288:kqWhGbN//QrmOT14HVTu5YxUhQzjakG2fC/WlyP3K6ufcFzfd8eVt6j1Zxxxxxxo:VXdOTiVTu5YxUhYjakG2f5l6puWd8kQX
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-