General
-
Target
15012025_1338_TT.2.bat.zip
-
Size
390KB
-
Sample
250115-qxhg6swjbl
-
MD5
9283ec2b3dcd0280fb27fdd3df3795ef
-
SHA1
34224d6187b95ee590f9a5f565910a2ea4b5b667
-
SHA256
4af93b0cafc33eced2cedac175f663a1f890a549ba64884c29f3563cd66a61fa
-
SHA512
ba08be5e4332d101ba9a77a064b9066d882cce8b263c4620fd1e52a5d56106d253cfb3f04c08342226f03687b9c26500d3670fee4e20de10399cd874026768d1
-
SSDEEP
12288:nTkokC58pIU4n+dlos1bRKb2ZHEK2xximHuWK:nVDnU4n+vo0CWHbmHuJ
Static task
static1
Behavioral task
behavioral1
Sample
TT.2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
TT.2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.vvtrade.vn - Port:
587 - Username:
[email protected] - Password:
qVyP6qyv6MQCmZJBRs4t
Extracted
vipkeylogger
https://api.telegram.org/bot7339564661:AAFzTB6gEWMndjXYyD5LCn17UEBISRR8wDI/sendMessage?chat_id=6443825857
Targets
-
-
Target
TT.2.bat
-
Size
654KB
-
MD5
510fd19d92d3b0b7bf15c25136f4f4a8
-
SHA1
d72a9835b6cde04c97a6f36f0f440086a950725b
-
SHA256
29bf23ea98222665327d48b87f3203f0158fb63e04deba0a803044b19faa69ce
-
SHA512
2009ba6f36e2c1b06acb4786045147c0e526d3cac3b4e410121c5b27977644a6d6d8b7a725b7dd91b216fa868891d258011c5e5c6fcc54c0a94b941f07bab7d3
-
SSDEEP
12288:JbRKjP7ne32KZc0IhELRVH6JRvKX2ZFEKy2THq2v:TKjP7efiIRkJIWFpdv
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-