General
-
Target
05c09343bc96558c8e05256adc417d09708c55aa19c8b7c74d3f41b97f6766da
-
Size
730KB
-
Sample
241226-ndk3vatqbs
-
MD5
178c596b5bbfdf57529862f72b62e07c
-
SHA1
10a3c41e7d7db49bc55a39b31e22807448691b5b
-
SHA256
05c09343bc96558c8e05256adc417d09708c55aa19c8b7c74d3f41b97f6766da
-
SHA512
b13b2df9915ba627a1e2fb2c4a7dbb092d420ca6aaf2c60b41fcf494f3a0c97584031ce5d5caf8c4d600f0082ece38d8aa607ee3d389affe7ca97f3005537095
-
SSDEEP
12288:O2iN4YfHmhWsDI+UhcU1kBQ5ehr3grg9dljjzo8bgMpY3+92k2I7FbOeIPe1y:O1KoHmhWgwF1klgk9TzoKY3+lJZCeqE
Static task
static1
Behavioral task
behavioral1
Sample
05c09343bc96558c8e05256adc417d09708c55aa19c8b7c74d3f41b97f6766da.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
05c09343bc96558c8e05256adc417d09708c55aa19c8b7c74d3f41b97f6766da.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
s4.serv00.com - Port:
21 - Username:
f2243_axaabu - Password:
Realak980#
Extracted
vipkeylogger
Targets
-
-
Target
05c09343bc96558c8e05256adc417d09708c55aa19c8b7c74d3f41b97f6766da
-
Size
730KB
-
MD5
178c596b5bbfdf57529862f72b62e07c
-
SHA1
10a3c41e7d7db49bc55a39b31e22807448691b5b
-
SHA256
05c09343bc96558c8e05256adc417d09708c55aa19c8b7c74d3f41b97f6766da
-
SHA512
b13b2df9915ba627a1e2fb2c4a7dbb092d420ca6aaf2c60b41fcf494f3a0c97584031ce5d5caf8c4d600f0082ece38d8aa607ee3d389affe7ca97f3005537095
-
SSDEEP
12288:O2iN4YfHmhWsDI+UhcU1kBQ5ehr3grg9dljjzo8bgMpY3+92k2I7FbOeIPe1y:O1KoHmhWgwF1klgk9TzoKY3+lJZCeqE
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-