General
-
Target
20786121768.zip
-
Size
305KB
-
Sample
250117-rqk56a1nf1
-
MD5
3d36b0d7d3f10e868c3757b584a6b25d
-
SHA1
6a49157bc2926ee59b5ca26109b7866a953b7355
-
SHA256
4cf9e78577432a9522a9cbf40bdace60d479052c48b8ff4e1800de074bf26aaa
-
SHA512
50d709d0753145787bb63e970aee7756b3669b20bb7609bb1dd70f83a9b3f3b9addbd28d433d7f5180961ac496cf5466d485d35d9a72e821605bfbf2c2c913e9
-
SSDEEP
6144:HXHyiXaHMsWP4SxpR+UEAfg4pVLesv+UECdSEQe7Qe9bjmLY+3DcjjfC:H3yiXaHMFgSrSv4PesR5j7lWTDc3K
Static task
static1
Behavioral task
behavioral1
Sample
49b4309c8ed22ee8489f94f5fa9723c019e8d62b84fb284156f7211fe515fe87.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
49b4309c8ed22ee8489f94f5fa9723c019e8d62b84fb284156f7211fe515fe87.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
55#cHsR%iCPw - Email To:
[email protected]
Targets
-
-
Target
49b4309c8ed22ee8489f94f5fa9723c019e8d62b84fb284156f7211fe515fe87
-
Size
337KB
-
MD5
60274794f3fb71d2d5ba5e79040e848a
-
SHA1
540d7a3a0923aa576185561d931616b10a069074
-
SHA256
49b4309c8ed22ee8489f94f5fa9723c019e8d62b84fb284156f7211fe515fe87
-
SHA512
1c7e29c213ca2b9e8237f0c0f214ae1ffb334d418c36b659fbe7ebe44c30fe1f4748c77407914ddb1cc3a830a7abedd1fc680e3d969199bfe1304ef3c482c39b
-
SSDEEP
6144:mgyJN9fUXZ858P8GkWF6JVUs4yVrgBaoZdjW/CVzT8yrJLnIgEO:YJN9I2EZku6Jms4yEdjWqVzPrJLIgEO
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-