General
-
Target
6b5bfda5580a6bd8ec3062f4d33b09c0f91722d824e80ae0cb8d47e8b1b2fcb7.exe
-
Size
77.0MB
-
Sample
250110-r4sgdsxlg1
-
MD5
7a6425553456c5f24bb5c8e235574c72
-
SHA1
6d825e1a1238c4a4f26966c281507e5e704c5500
-
SHA256
6b5bfda5580a6bd8ec3062f4d33b09c0f91722d824e80ae0cb8d47e8b1b2fcb7
-
SHA512
1da622c9448297a1b2971dab7415586f9e31e113c8e39404d25ba9937e9b423a2f8d01ce772590a796ad9642c04b66a09f8b044d1b5707e696f686fc61cc6e47
-
SSDEEP
24576:uu6J33O0c+JY5UZ+XC0kGso6Fa/ROfRojRhKC8CcXWY:gu0c++OCvkGs9Fa/syHKC8CrY
Static task
static1
Behavioral task
behavioral1
Sample
6b5bfda5580a6bd8ec3062f4d33b09c0f91722d824e80ae0cb8d47e8b1b2fcb7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6b5bfda5580a6bd8ec3062f4d33b09c0f91722d824e80ae0cb8d47e8b1b2fcb7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Targets
-
-
Target
6b5bfda5580a6bd8ec3062f4d33b09c0f91722d824e80ae0cb8d47e8b1b2fcb7.exe
-
Size
77.0MB
-
MD5
7a6425553456c5f24bb5c8e235574c72
-
SHA1
6d825e1a1238c4a4f26966c281507e5e704c5500
-
SHA256
6b5bfda5580a6bd8ec3062f4d33b09c0f91722d824e80ae0cb8d47e8b1b2fcb7
-
SHA512
1da622c9448297a1b2971dab7415586f9e31e113c8e39404d25ba9937e9b423a2f8d01ce772590a796ad9642c04b66a09f8b044d1b5707e696f686fc61cc6e47
-
SSDEEP
24576:uu6J33O0c+JY5UZ+XC0kGso6Fa/ROfRojRhKC8CcXWY:gu0c++OCvkGs9Fa/syHKC8CrY
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-