General
-
Target
1e9a2479f6891293504c3d31b0d4111654d0d9274b8455cfef4178b1f87efcc0
-
Size
21KB
-
Sample
250128-kvwdcstmd1
-
MD5
9a78145d352cfd9de984652bfc3cc092
-
SHA1
69801fb96d586200559c54d01b345c22cb5e994d
-
SHA256
1e9a2479f6891293504c3d31b0d4111654d0d9274b8455cfef4178b1f87efcc0
-
SHA512
9432af2902aa52c912d79598da8f6642d310fd66e9630991aad48d88e7e3eb99d0b4437204f80251d4d29ec4287de97cf62420cb30340641e36d8a85297413d0
-
SSDEEP
384:Exb2ufIIfpc903GJ8vJjy7u/qZ/YEJm6VRpINxW7EsF6h0Dux:gb2ufIIfDYuSZjZpI+7EKDg
Static task
static1
Behavioral task
behavioral1
Sample
New list item 830982373737379293873747273494987433PDF.scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New list item 830982373737379293873747273494987433PDF.scr
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot8137547477:AAGivMJhPHGxbUXvVQxSLRx55JHHJUPnI3M/sendMessage?chat_id=6680692809
Targets
-
-
Target
New list item 830982373737379293873747273494987433PDF.scr
-
Size
38KB
-
MD5
ef0ee0495d7cdecbda4c194585446076
-
SHA1
97e8397350c9e44a72ee441a72ec7f49ce9693bf
-
SHA256
109c796b316470b61df7a49a0250af8562f130e6365c702ea5559926c1aeacfb
-
SHA512
c8d955df0cb828139ed10202fca58372ac87bab73f621fb808622126dbd659eeda9867f893703d60d8921c92de6d88f5bb4df89a96ca83fe09168857d3aad0a4
-
SSDEEP
768:QQ1fBiwnn4Z+8ApjDB6/q6g4gPdQOY2Jd6IrhLzqLV1KjUwRI9M4xM8hvmEjCMA5:QQ1fBiwnnC+npjNcy6VUd3pqLVAjxIox
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-