General
-
Target
8ffb61558a650e0eab988f4ad8cf02c50e0f39b216a78063c43cdfe77bced8d2.exe
-
Size
1.2MB
-
Sample
250121-sjaxaazke1
-
MD5
c03d08038a421fcb9a17c844cde72668
-
SHA1
e254101233d9bb35270ccd6b8e617da7a0e6d724
-
SHA256
8ffb61558a650e0eab988f4ad8cf02c50e0f39b216a78063c43cdfe77bced8d2
-
SHA512
759b4568cac9ee898d4ffcc8e9b1f6b280db4c417ef0996b747b98a95d4a6c5244e11f51f36b5436d4077df13f58f180e684ade8b50e4d1a9608286c56062813
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCGNd+EvsPTXPYt7g/tNdXMf9Abe0lkH:7JZoQrbTFZY1iaCGNd3vkXPFRXMfiber
Static task
static1
Behavioral task
behavioral1
Sample
8ffb61558a650e0eab988f4ad8cf02c50e0f39b216a78063c43cdfe77bced8d2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ffb61558a650e0eab988f4ad8cf02c50e0f39b216a78063c43cdfe77bced8d2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.1und1.de - Port:
587 - Username:
[email protected] - Password:
MonaLisa_2018 - Email To:
[email protected]
Targets
-
-
Target
8ffb61558a650e0eab988f4ad8cf02c50e0f39b216a78063c43cdfe77bced8d2.exe
-
Size
1.2MB
-
MD5
c03d08038a421fcb9a17c844cde72668
-
SHA1
e254101233d9bb35270ccd6b8e617da7a0e6d724
-
SHA256
8ffb61558a650e0eab988f4ad8cf02c50e0f39b216a78063c43cdfe77bced8d2
-
SHA512
759b4568cac9ee898d4ffcc8e9b1f6b280db4c417ef0996b747b98a95d4a6c5244e11f51f36b5436d4077df13f58f180e684ade8b50e4d1a9608286c56062813
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCGNd+EvsPTXPYt7g/tNdXMf9Abe0lkH:7JZoQrbTFZY1iaCGNd3vkXPFRXMfiber
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-