General
-
Target
f19b72b88ddbf56b257e6eef19c74e304beaf8f95d352741e400993472e721c9.exe
-
Size
764KB
-
Sample
250110-ryxtxsxkes
-
MD5
ee18481e218cc9bc7a1628f5a7365776
-
SHA1
57ea302c84a488de1e5a5bcc669e02c5d9a7a350
-
SHA256
f19b72b88ddbf56b257e6eef19c74e304beaf8f95d352741e400993472e721c9
-
SHA512
a4ae4e6f3d46c05141e1d60b3f92d1b2ad27d758ae27bc063fb3f5fef953237120480e700c5d05d90cc41d92497674c0e7d3e25dbd62e591445170077309f78b
-
SSDEEP
12288:0GCX77iIceZ0Na7lxnjXp54AQ2cPmT3a3ur93tRLPHj6XOahq:qr75cHavj7S1G3aer93tJPDUO/
Static task
static1
Behavioral task
behavioral1
Sample
f19b72b88ddbf56b257e6eef19c74e304beaf8f95d352741e400993472e721c9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f19b72b88ddbf56b257e6eef19c74e304beaf8f95d352741e400993472e721c9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.abraher.com - Port:
587 - Username:
[email protected] - Password:
General1
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.abraher.com - Port:
587 - Username:
[email protected] - Password:
General1 - Email To:
[email protected]
https://api.telegram.org/bot8101497037:AAEvNeES2X17rekW3womq6JjOwgZLJMqX1Y/sendMessage?chat_id=7171338311
Targets
-
-
Target
f19b72b88ddbf56b257e6eef19c74e304beaf8f95d352741e400993472e721c9.exe
-
Size
764KB
-
MD5
ee18481e218cc9bc7a1628f5a7365776
-
SHA1
57ea302c84a488de1e5a5bcc669e02c5d9a7a350
-
SHA256
f19b72b88ddbf56b257e6eef19c74e304beaf8f95d352741e400993472e721c9
-
SHA512
a4ae4e6f3d46c05141e1d60b3f92d1b2ad27d758ae27bc063fb3f5fef953237120480e700c5d05d90cc41d92497674c0e7d3e25dbd62e591445170077309f78b
-
SSDEEP
12288:0GCX77iIceZ0Na7lxnjXp54AQ2cPmT3a3ur93tRLPHj6XOahq:qr75cHavj7S1G3aer93tJPDUO/
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/nsExec.dll
-
Size
6KB
-
MD5
01e76fe9d2033606a48d4816bd9c2d9d
-
SHA1
e46d8a9ed4d5da220c81baf5f1fdb94708e9aba2
-
SHA256
ee052fd5141bf769b841846170aabf0d7c2bb922c74c623c3f109344534f7a70
-
SHA512
62ef7095d1bf53354c20329c2ce8546c277aa0e791839c8a24108a01f9483a953979259e0ad04dbcab966444ee7cdd340f8c9557bc8f98e9400794f2751dc7e0
-
SSDEEP
96:J7fhfKaGgchPzxK6bq+pKX6D8ZLidGgmkN738:HbGgGPzxeX6D8ZyGgmkN
Score3/10 -