General
-
Target
20872186527.zip
-
Size
304KB
-
Sample
250120-yat7fsvnhn
-
MD5
b3f4b9b389583868d01ff6476d6e64fd
-
SHA1
309a11c77cfc6fd036b17d84f94ef92805fc74a5
-
SHA256
d59b1337750efa99c54d235a4ae25fd4a99f1c202b27248105cfcbc37edc45dc
-
SHA512
b0c490eb13494d9a2a7d411c5f9a4524a4f812639d0c9892b0e1601d75c19aa9e7cebb810a807f274f7b993dc040167c7233b5a85a4b7b1df8cebe063c63952f
-
SSDEEP
6144:xX0C8Ak6DLj04aumwtchc0b1iZ2X8VuTAWxzC2EfTY0wc:50dum8c7b19XiezDE7d
Static task
static1
Behavioral task
behavioral1
Sample
Factura.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Factura.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
55#cHsR%iCPw - Email To:
[email protected]
Targets
-
-
Target
Factura.exe
-
Size
337KB
-
MD5
60274794f3fb71d2d5ba5e79040e848a
-
SHA1
540d7a3a0923aa576185561d931616b10a069074
-
SHA256
49b4309c8ed22ee8489f94f5fa9723c019e8d62b84fb284156f7211fe515fe87
-
SHA512
1c7e29c213ca2b9e8237f0c0f214ae1ffb334d418c36b659fbe7ebe44c30fe1f4748c77407914ddb1cc3a830a7abedd1fc680e3d969199bfe1304ef3c482c39b
-
SSDEEP
6144:mgyJN9fUXZ858P8GkWF6JVUs4yVrgBaoZdjW/CVzT8yrJLnIgEO:YJN9I2EZku6Jms4yEdjWqVzPrJLIgEO
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-