General
-
Target
E16EDF76C5530906A1DBBCE162F929ABCFD1E4EBC1F3D0844407C7C03964FCC6
-
Size
1.2MB
-
Sample
250103-jq1a3svmfw
-
MD5
02371e83603c6f0718c1297bb9c92139
-
SHA1
ffceda4117ebb988a1edfd17a539b4992535c53c
-
SHA256
e16edf76c5530906a1dbbce162f929abcfd1e4ebc1f3d0844407c7c03964fcc6
-
SHA512
4a9d41ef72bb0643ff7544a4a7494f8d47ba97f42f143a8fe3064eff7d7a8bbf2554090bf36dfd0b5071af19b43324cccc5dcd82d098ea4729d5b3f05c1dca67
-
SSDEEP
24576:ffmMv6Ckr7Mny5QL9JmVyADuC0yzPjrnHetFM+RKNM:f3v+7/5QLCfDu1yzWtS+IM
Static task
static1
Behavioral task
behavioral1
Sample
E16EDF76C5530906A1DBBCE162F929ABCFD1E4EBC1F3D0844407C7C03964FCC6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
E16EDF76C5530906A1DBBCE162F929ABCFD1E4EBC1F3D0844407C7C03964FCC6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Extracted
Protocol: smtp- Host:
mail.bulatpharmaceutical.com - Port:
587 - Username:
[email protected] - Password:
XRM)dWOF&~z3
Targets
-
-
Target
E16EDF76C5530906A1DBBCE162F929ABCFD1E4EBC1F3D0844407C7C03964FCC6
-
Size
1.2MB
-
MD5
02371e83603c6f0718c1297bb9c92139
-
SHA1
ffceda4117ebb988a1edfd17a539b4992535c53c
-
SHA256
e16edf76c5530906a1dbbce162f929abcfd1e4ebc1f3d0844407c7c03964fcc6
-
SHA512
4a9d41ef72bb0643ff7544a4a7494f8d47ba97f42f143a8fe3064eff7d7a8bbf2554090bf36dfd0b5071af19b43324cccc5dcd82d098ea4729d5b3f05c1dca67
-
SSDEEP
24576:ffmMv6Ckr7Mny5QL9JmVyADuC0yzPjrnHetFM+RKNM:f3v+7/5QLCfDu1yzWtS+IM
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-