Resubmissions
17-01-2025 08:33
250117-kf35nazkfr 10General
-
Target
20751840297.zip
-
Size
753KB
-
Sample
250117-kf35nazkfr
-
MD5
33350ad9d6d5ea005771c7d13c10f6ce
-
SHA1
bd2966a8733e7dbc1a5ddaff7a77ad0bd0daccf7
-
SHA256
f62c28f46869e0723b2760ff79f84fe75f1f8ef938bff3cfdf21836fc0efebfc
-
SHA512
7c8139fc5bc879f517b708c7d60d4dd5ca0e4611342b3c3882a12260d619510f21c21f391c274d19e21917cd878899684a5418e80f6d52c605927c0b4651c569
-
SSDEEP
12288:f4G22BCKs28awDXeMfrLH21mco+RR181NA5pKGDn3QDZKHX8Sb5BGjTeQ5XV9rL1:f4CCKsRhHrLW1mw18PAOd8X+2Q5lP
Static task
static1
Behavioral task
behavioral1
Sample
C24TAA-00343127-WEM0G8XYGD3-DPH.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
C24TAA-00343127-WEM0G8XYGD3-DPH.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.ruchiraprinting.com - Port:
587 - Username:
[email protected] - Password:
Ruchira@PR12 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.ruchiraprinting.com - Port:
587 - Username:
[email protected] - Password:
Ruchira@PR12
Targets
-
-
Target
C24TAA-00343127-WEM0G8XYGD3-DPH.exe
-
Size
795KB
-
MD5
b02a4d403c3cbb558b7e1c278308d9cf
-
SHA1
0310e74a641adb79192eb93e4cdeda5fad4f1747
-
SHA256
bf3c1941de57148eb6de474d360c57a08582dbb3ee548c283fa34cb08436e402
-
SHA512
0a41de9a105cf4893ccca294ecce60852ed1e015d5111690e01b4b2728445b53beff8ffcfbe103cca95af1e861e64b518df8c144eb3d1a5009fe52f20c1397c6
-
SSDEEP
12288:8AB7hgn0fsOLvycEuUDg09ZK8X2fhASSCD0w/KbqWFvbvuEGmz18v354BtJmT3L1:NNQDBLK8qSnMKHDvuEGg1U3ezJGF3
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-