General
-
Target
689d84d60434a515987bdd4f4f0d0bc33621d62ed47339bb6273f65258d92c55.zip
-
Size
277KB
-
Sample
250122-c5nghavjfp
-
MD5
d1bf5f00d81e804d4b79d74964b4c76f
-
SHA1
1a356956874be1a1bc8382dbee7a1c32578ce5a3
-
SHA256
689d84d60434a515987bdd4f4f0d0bc33621d62ed47339bb6273f65258d92c55
-
SHA512
006bc647cc1c6beefc5ebddeb345560142eb0ac15c86248e3038c945677a3363791c8b63a90392a3e7e2731384d14fa08e3643c8afb03d9cc8c9decd76251b24
-
SSDEEP
6144:hZOA5IOBxaxAKW4fyHQOnHQGva0DKx+xz5ef5bIhK:hZ/JGxA/pbnwGiUKx+Fm5bIhK
Static task
static1
Behavioral task
behavioral1
Sample
PO202501F.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PO202501F.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7965348925:AAGe8wdrvk9A3lxr1GIjGigodJ_zZ7prhfs/sendMessage?chat_id=6848903538
Targets
-
-
Target
PO202501F.exe
-
Size
713KB
-
MD5
5006219231a8cb74552d0ad9c1b02ae9
-
SHA1
1b54149f1d9c54d370c37fc00ad2e28642059c74
-
SHA256
72fa904d41cfc7c04d3c095e84449aecb989cc98b1d008b3ce9b51717173b053
-
SHA512
3a71ab78c5ad20325752a4e25267ba086e845cbbdd0452c138a9ac2367f7f5c181d9d1e2019307b4687a170b5ca212559ebe06c44fa43289ba8cdcfaef6a8a0d
-
SSDEEP
12288:IPHkO6/ceaCdAA3w9zyaZyKgrwoyIgXCYAMA7Q:IPHkOXgAj9zVZgZDd7Q
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-