General
-
Target
3fc9afa49fa31f495a7792c38b6087609438625ec5073383483d7d1411c7cec8.exe
-
Size
634KB
-
Sample
250111-dhzfxstkbq
-
MD5
80a64f0b8df55d637e135f0eb4fb6b70
-
SHA1
f491fc184d0f15d789e81577e47446478c10ed53
-
SHA256
3fc9afa49fa31f495a7792c38b6087609438625ec5073383483d7d1411c7cec8
-
SHA512
f2604fc98d1ed6959b4a42ef442cac15919ebb1b26f7516fa0ca782c639d035c7f5c0f599511e87246338a959be4e5104ff98e3df4bb7ab78b50389784e83432
-
SSDEEP
12288:ZOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiaqooGCQemOT6I0FGk9x:Zq5TfcdHj4fmbGG53OF0Nx
Behavioral task
behavioral1
Sample
3fc9afa49fa31f495a7792c38b6087609438625ec5073383483d7d1411c7cec8.exe
Resource
win7-20240903-en
Malware Config
Extracted
vipkeylogger
Targets
-
-
Target
3fc9afa49fa31f495a7792c38b6087609438625ec5073383483d7d1411c7cec8.exe
-
Size
634KB
-
MD5
80a64f0b8df55d637e135f0eb4fb6b70
-
SHA1
f491fc184d0f15d789e81577e47446478c10ed53
-
SHA256
3fc9afa49fa31f495a7792c38b6087609438625ec5073383483d7d1411c7cec8
-
SHA512
f2604fc98d1ed6959b4a42ef442cac15919ebb1b26f7516fa0ca782c639d035c7f5c0f599511e87246338a959be4e5104ff98e3df4bb7ab78b50389784e83432
-
SSDEEP
12288:ZOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiaqooGCQemOT6I0FGk9x:Zq5TfcdHj4fmbGG53OF0Nx
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-