General
-
Target
399908f6dc7e0dcad418f2cadd782f26f66adfdf1e523725dbc14713033c44a7.exe
-
Size
812KB
-
Sample
250110-rnn42awqbt
-
MD5
6de308ce9b42f3ca44d87cd354dde9ae
-
SHA1
6071d1e4f71527bb4e23f0ffce53b30dcb89500b
-
SHA256
399908f6dc7e0dcad418f2cadd782f26f66adfdf1e523725dbc14713033c44a7
-
SHA512
f9ad8c8723ee9f48450528599329cc782d08e377ca7ca49b6e8c5c9246054439334b9075822fbb282759dd60f22ad1a2f994174dd661e547cf2d4533b1c9ed27
-
SSDEEP
12288:6S4rjpK9J4kLI4MlOIg5MCao3AiqLwgDz7PANSoZ:QwJXLIjOUo3A9Lv7PAB
Static task
static1
Behavioral task
behavioral1
Sample
399908f6dc7e0dcad418f2cadd782f26f66adfdf1e523725dbc14713033c44a7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
399908f6dc7e0dcad418f2cadd782f26f66adfdf1e523725dbc14713033c44a7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.gtpv.online - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Targets
-
-
Target
399908f6dc7e0dcad418f2cadd782f26f66adfdf1e523725dbc14713033c44a7.exe
-
Size
812KB
-
MD5
6de308ce9b42f3ca44d87cd354dde9ae
-
SHA1
6071d1e4f71527bb4e23f0ffce53b30dcb89500b
-
SHA256
399908f6dc7e0dcad418f2cadd782f26f66adfdf1e523725dbc14713033c44a7
-
SHA512
f9ad8c8723ee9f48450528599329cc782d08e377ca7ca49b6e8c5c9246054439334b9075822fbb282759dd60f22ad1a2f994174dd661e547cf2d4533b1c9ed27
-
SSDEEP
12288:6S4rjpK9J4kLI4MlOIg5MCao3AiqLwgDz7PANSoZ:QwJXLIjOUo3A9Lv7PAB
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-