General
-
Target
b7ffe514c90485438c522430e88937fa81bc965e74161025eb18f8c1a85275d3.exe
-
Size
775KB
-
Sample
250129-dta8gayrez
-
MD5
ed7f5730d0f9e12ca48d360a28c3ba67
-
SHA1
f1d3e4b97f03ce3e38237e573b07e87886625b47
-
SHA256
b7ffe514c90485438c522430e88937fa81bc965e74161025eb18f8c1a85275d3
-
SHA512
3e8133fd3535d7b5ba868a6419ddcb10caf7bf8b5e8eefaf23e1d952a767fda10e4dbe6807314d7aa8d7537be47be91e0f1a035145f47c345a5fff4b9c745d7f
-
SSDEEP
24576:lkpOJ2C+lQqI5uBI5DQX0VTzbYbJFv5FZIu:lSOHkQqI5uBGq0VTSTZ
Static task
static1
Behavioral task
behavioral1
Sample
b7ffe514c90485438c522430e88937fa81bc965e74161025eb18f8c1a85275d3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7ffe514c90485438c522430e88937fa81bc965e74161025eb18f8c1a85275d3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.ruchiraprinting.com - Port:
587 - Username:
[email protected] - Password:
Ruchira@PR12 - Email To:
[email protected]
https://api.telegram.org/bot7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk/sendMessage?chat_id=7319393351
Targets
-
-
Target
b7ffe514c90485438c522430e88937fa81bc965e74161025eb18f8c1a85275d3.exe
-
Size
775KB
-
MD5
ed7f5730d0f9e12ca48d360a28c3ba67
-
SHA1
f1d3e4b97f03ce3e38237e573b07e87886625b47
-
SHA256
b7ffe514c90485438c522430e88937fa81bc965e74161025eb18f8c1a85275d3
-
SHA512
3e8133fd3535d7b5ba868a6419ddcb10caf7bf8b5e8eefaf23e1d952a767fda10e4dbe6807314d7aa8d7537be47be91e0f1a035145f47c345a5fff4b9c745d7f
-
SSDEEP
24576:lkpOJ2C+lQqI5uBI5DQX0VTzbYbJFv5FZIu:lSOHkQqI5uBGq0VTSTZ
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-