General
-
Target
0d6d13b615ce21e4a4ff75ec6ad0047a5664aafc05745188afc2e4497c2bed9f.exe
-
Size
797KB
-
Sample
250108-sx2bdsxkcq
-
MD5
7d88e5bad194e89ada135543169da996
-
SHA1
929a742475ae4b93a5e164b1d565d7d7f78f6b62
-
SHA256
0d6d13b615ce21e4a4ff75ec6ad0047a5664aafc05745188afc2e4497c2bed9f
-
SHA512
8906f861bc6049f059757a24d326b21ea626d4b890791c1e10f101a8f387ae24febcc5501440ea45d07675c775286664dcd75d4f61a2929939cc87169ae0aede
-
SSDEEP
12288:zibdSKErr8jptCVn7B/7jJIk9dB6g5MCao3AiqLwgDn7PK:VqpgVt/7mk9dBKo3A9LD7PK
Static task
static1
Behavioral task
behavioral1
Sample
0d6d13b615ce21e4a4ff75ec6ad0047a5664aafc05745188afc2e4497c2bed9f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d6d13b615ce21e4a4ff75ec6ad0047a5664aafc05745188afc2e4497c2bed9f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.gtpv.online - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Targets
-
-
Target
0d6d13b615ce21e4a4ff75ec6ad0047a5664aafc05745188afc2e4497c2bed9f.exe
-
Size
797KB
-
MD5
7d88e5bad194e89ada135543169da996
-
SHA1
929a742475ae4b93a5e164b1d565d7d7f78f6b62
-
SHA256
0d6d13b615ce21e4a4ff75ec6ad0047a5664aafc05745188afc2e4497c2bed9f
-
SHA512
8906f861bc6049f059757a24d326b21ea626d4b890791c1e10f101a8f387ae24febcc5501440ea45d07675c775286664dcd75d4f61a2929939cc87169ae0aede
-
SSDEEP
12288:zibdSKErr8jptCVn7B/7jJIk9dB6g5MCao3AiqLwgDn7PK:VqpgVt/7mk9dBKo3A9LD7PK
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-