General
-
Target
72fa904d41cfc7c04d3c095e84449aecb989cc98b1d008b3ce9b51717173b053.exe
-
Size
713KB
-
Sample
250122-c8ec1avlcn
-
MD5
5006219231a8cb74552d0ad9c1b02ae9
-
SHA1
1b54149f1d9c54d370c37fc00ad2e28642059c74
-
SHA256
72fa904d41cfc7c04d3c095e84449aecb989cc98b1d008b3ce9b51717173b053
-
SHA512
3a71ab78c5ad20325752a4e25267ba086e845cbbdd0452c138a9ac2367f7f5c181d9d1e2019307b4687a170b5ca212559ebe06c44fa43289ba8cdcfaef6a8a0d
-
SSDEEP
12288:IPHkO6/ceaCdAA3w9zyaZyKgrwoyIgXCYAMA7Q:IPHkOXgAj9zVZgZDd7Q
Static task
static1
Behavioral task
behavioral1
Sample
72fa904d41cfc7c04d3c095e84449aecb989cc98b1d008b3ce9b51717173b053.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
72fa904d41cfc7c04d3c095e84449aecb989cc98b1d008b3ce9b51717173b053.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7965348925:AAGe8wdrvk9A3lxr1GIjGigodJ_zZ7prhfs/sendMessage?chat_id=6848903538
Targets
-
-
Target
72fa904d41cfc7c04d3c095e84449aecb989cc98b1d008b3ce9b51717173b053.exe
-
Size
713KB
-
MD5
5006219231a8cb74552d0ad9c1b02ae9
-
SHA1
1b54149f1d9c54d370c37fc00ad2e28642059c74
-
SHA256
72fa904d41cfc7c04d3c095e84449aecb989cc98b1d008b3ce9b51717173b053
-
SHA512
3a71ab78c5ad20325752a4e25267ba086e845cbbdd0452c138a9ac2367f7f5c181d9d1e2019307b4687a170b5ca212559ebe06c44fa43289ba8cdcfaef6a8a0d
-
SSDEEP
12288:IPHkO6/ceaCdAA3w9zyaZyKgrwoyIgXCYAMA7Q:IPHkOXgAj9zVZgZDd7Q
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-