General
-
Target
A8BEEE89EB72948B3FD255C6A1F5BAB0300161AA0E32BA0AAFFE5653B75111D0
-
Size
1.2MB
-
Sample
250103-jqbmqaxqcp
-
MD5
3f1ea031012dd9570640ac2d73ab63f2
-
SHA1
63cef5603a782c7efd95b6ac23cc6286e1017d0e
-
SHA256
a8beee89eb72948b3fd255c6a1f5bab0300161aa0e32ba0aaffe5653b75111d0
-
SHA512
264251b60551158d9b34d59b3fd7a7c93487be3917d43d89dd3166f0f5cdc68c754c45c869331a51f3e99741763410c554fd06b7ad0cb6bced488866c2ac168f
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCF3SKnMTmtxJZ/9ScW8fncift9XM9dCfOdyM:7JZoQrbTFZY1iaCFhZVBfnc8237
Static task
static1
Behavioral task
behavioral1
Sample
A8BEEE89EB72948B3FD255C6A1F5BAB0300161AA0E32BA0AAFFE5653B75111D0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
A8BEEE89EB72948B3FD255C6A1F5BAB0300161AA0E32BA0AAFFE5653B75111D0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.jhxkgroup.online - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Targets
-
-
Target
A8BEEE89EB72948B3FD255C6A1F5BAB0300161AA0E32BA0AAFFE5653B75111D0
-
Size
1.2MB
-
MD5
3f1ea031012dd9570640ac2d73ab63f2
-
SHA1
63cef5603a782c7efd95b6ac23cc6286e1017d0e
-
SHA256
a8beee89eb72948b3fd255c6a1f5bab0300161aa0e32ba0aaffe5653b75111d0
-
SHA512
264251b60551158d9b34d59b3fd7a7c93487be3917d43d89dd3166f0f5cdc68c754c45c869331a51f3e99741763410c554fd06b7ad0cb6bced488866c2ac168f
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCF3SKnMTmtxJZ/9ScW8fncift9XM9dCfOdyM:7JZoQrbTFZY1iaCFhZVBfnc8237
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-