General
-
Target
3572909eacd6e091ce24bf564ba6dd869f0ab3bdbfbbade6d2f3bb1265a2e97f.exe
-
Size
947KB
-
Sample
250111-rvgcrs1nc1
-
MD5
ff32a6be8447a0aee0c5714e4e417c5d
-
SHA1
a28ec65945a5fb3d71898a205439fd7eee68f26a
-
SHA256
3572909eacd6e091ce24bf564ba6dd869f0ab3bdbfbbade6d2f3bb1265a2e97f
-
SHA512
0bb65d7594bb61a1d2e80e4ea1a88b21bc5220d6362c9cb27aa81e3cbf7cc893788c48ffad59090a3d16491e4e83d2ea6c71dc2384b915943ec4e37d12592297
-
SSDEEP
24576:eMaSSKy2/SPNtqqR4tWOb780ySppfysKPj:eRQGObXySppfyRj
Static task
static1
Behavioral task
behavioral1
Sample
3572909eacd6e091ce24bf564ba6dd869f0ab3bdbfbbade6d2f3bb1265a2e97f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3572909eacd6e091ce24bf564ba6dd869f0ab3bdbfbbade6d2f3bb1265a2e97f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.aruzen.co.in - Port:
587 - Username:
[email protected] - Password:
Pawsad-xovwut-2zoxso - Email To:
[email protected]
Targets
-
-
Target
3572909eacd6e091ce24bf564ba6dd869f0ab3bdbfbbade6d2f3bb1265a2e97f.exe
-
Size
947KB
-
MD5
ff32a6be8447a0aee0c5714e4e417c5d
-
SHA1
a28ec65945a5fb3d71898a205439fd7eee68f26a
-
SHA256
3572909eacd6e091ce24bf564ba6dd869f0ab3bdbfbbade6d2f3bb1265a2e97f
-
SHA512
0bb65d7594bb61a1d2e80e4ea1a88b21bc5220d6362c9cb27aa81e3cbf7cc893788c48ffad59090a3d16491e4e83d2ea6c71dc2384b915943ec4e37d12592297
-
SSDEEP
24576:eMaSSKy2/SPNtqqR4tWOb780ySppfysKPj:eRQGObXySppfyRj
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-