General
-
Target
file.exe
-
Size
742KB
-
Sample
241231-j9p98atqap
-
MD5
3b2a532f5145a1e1a1d04daf8119caf1
-
SHA1
850db92a1aea8c8a7ba5a940c9f9ab19c31ce9a4
-
SHA256
49039b4b47513f22a7e396b57a73abe02b0032a09089e8fa68c94c0eae655d6b
-
SHA512
6d99963c39a895ff0dc6ca306fee30ea97c097320d2cb8718be402414e77e4a2ed542be7b674fe3a354a3523bd5737d0c357621a2af341ad9e78c5cc0e1a337c
-
SSDEEP
12288:C4doaeP1x88nMuJYvYExLntAtRozVeGv5zW/H+ao1aFzJLrujKw+/ZY:hdFeP1HMEYtLkweY5MLbzJX+D
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.aruzen.co.in - Port:
587 - Username:
[email protected] - Password:
Pawsad-xovwut-2zoxso - Email To:
[email protected]
Targets
-
-
Target
file.exe
-
Size
742KB
-
MD5
3b2a532f5145a1e1a1d04daf8119caf1
-
SHA1
850db92a1aea8c8a7ba5a940c9f9ab19c31ce9a4
-
SHA256
49039b4b47513f22a7e396b57a73abe02b0032a09089e8fa68c94c0eae655d6b
-
SHA512
6d99963c39a895ff0dc6ca306fee30ea97c097320d2cb8718be402414e77e4a2ed542be7b674fe3a354a3523bd5737d0c357621a2af341ad9e78c5cc0e1a337c
-
SSDEEP
12288:C4doaeP1x88nMuJYvYExLntAtRozVeGv5zW/H+ao1aFzJLrujKw+/ZY:hdFeP1HMEYtLkweY5MLbzJX+D
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-