General
-
Target
6f7cc91aa9fccd5e50336c8b20c016641e814cfd89e17db96d14af8a360eb294.zip
-
Size
267KB
-
Sample
250118-e5ekpstmak
-
MD5
bff4a7ac060584a3afd37fc5372adf3f
-
SHA1
bc0e194a91ca894498b49bb4d142900565718db4
-
SHA256
6f7cc91aa9fccd5e50336c8b20c016641e814cfd89e17db96d14af8a360eb294
-
SHA512
ba1247e0fcf243fb5213da7e6337a2db45cd53e7f61b726825e2ecfe2b1df59860557876be523dcd0ee84b40ae630c890eff0a5c4c8e37d500bfc0ce8981d6ba
-
SSDEEP
6144:h3E3LdeaQ2S3pVIwBYk/9QZe+iqP8FvSispujRXvZDC1O:yRM3pVIwYq1+R0+8jtdC1O
Static task
static1
Behavioral task
behavioral1
Sample
PO202501F.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO202501F.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7965348925:AAGe8wdrvk9A3lxr1GIjGigodJ_zZ7prhfs/sendMessage?chat_id=6848903538
Targets
-
-
Target
PO202501F.exe
-
Size
718KB
-
MD5
4e4fb45c99a574849a086232116f8bfc
-
SHA1
ee52062d05ff64cb7fc57bc647535929cbe856d9
-
SHA256
b541d2f2c3ea6e6f3cb26bba9bf36a0034a01cbb225e794c94ff957d09991e77
-
SHA512
2ec98860cba067f2a60fe0e9819b390bbec6536ddbf2b06a5a9a65b8a450dba013a763b00f2a850444d92532233ec5c2c825163ea38755830c9303fea3350ef7
-
SSDEEP
12288:Aoe7DH/meETdAAHOPaLsegLyjR0SxJxycahXjIC72:g7DQAC0aLoL8RNrycahTt72
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-