General
-
Target
16012025_C24TAA-00343127-WEM0G8XYGD3-DPH.gz
-
Size
737KB
-
Sample
250117-kk4xrayqay
-
MD5
e7f99f3555dba9105114dfdb5060644f
-
SHA1
450534905d2537aac33dcc1a0caca7b645bdd077
-
SHA256
59ccb7a82072ba130cfcf9b8f3cbe18dd507e3e5f4e6178c82e36ae8c2f9552d
-
SHA512
da55fd57e87d405d192094e81a2143bc75178f9d5b0380b0ed55b1e20322945b40e94e62c72b10b2d75ec2d3aa918ef2a154223a8d060b9700be7cc59a7ac8c1
-
SSDEEP
12288:4SYcn0foO/vacEcUhAybZK8XmHh4SyaDe8/GDqWHdZv8EWkXtcZtB8tdJUTl7F+/:4SYbYhhNK8qyhwG9Pv8EW2t6tuvJ+FPY
Static task
static1
Behavioral task
behavioral1
Sample
C24TAA-00343127-WEM0G8XYGD3-DPH.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
C24TAA-00343127-WEM0G8XYGD3-DPH.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.ruchiraprinting.com - Port:
587 - Username:
[email protected] - Password:
Ruchira@PR12 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.ruchiraprinting.com - Port:
587 - Username:
[email protected] - Password:
Ruchira@PR12
Targets
-
-
Target
C24TAA-00343127-WEM0G8XYGD3-DPH.exe
-
Size
795KB
-
MD5
b02a4d403c3cbb558b7e1c278308d9cf
-
SHA1
0310e74a641adb79192eb93e4cdeda5fad4f1747
-
SHA256
bf3c1941de57148eb6de474d360c57a08582dbb3ee548c283fa34cb08436e402
-
SHA512
0a41de9a105cf4893ccca294ecce60852ed1e015d5111690e01b4b2728445b53beff8ffcfbe103cca95af1e861e64b518df8c144eb3d1a5009fe52f20c1397c6
-
SSDEEP
12288:8AB7hgn0fsOLvycEuUDg09ZK8X2fhASSCD0w/KbqWFvbvuEGmz18v354BtJmT3L1:NNQDBLK8qSnMKHDvuEGg1U3ezJGF3
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-