General
-
Target
dekont (37KB).pdf.exe
-
Size
892KB
-
Sample
250129-l2haravmcs
-
MD5
57134916752790943db9c4d3c0488e92
-
SHA1
7cde5ad5b7b11716534bf07e6a54178d841b4c49
-
SHA256
16a43aa836bfc334a9c67a4a6cbd25aa461b9332b7dbc5271afd75119c2a3521
-
SHA512
5f2be54e45aa06de736ee66c0552fd6e222038c5aa949188f96b03a18808f06221adf1bbdf68d94f76b76eecbdaad4e1a4fdb3434a029a476469c5e3a7063e8c
-
SSDEEP
24576:PznY32CV1u6juwCfDG8wA/8I1AGKBXVfW:TCnu6ufDGRWVXeVfW
Static task
static1
Behavioral task
behavioral1
Sample
dekont (37KB).pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dekont (37KB).pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7631349628:AAFSmXk7lMPXMwRbmU6LXeGJnXqJ_81KAc8/sendMessage?chat_id=7727510436
Targets
-
-
Target
dekont (37KB).pdf.exe
-
Size
892KB
-
MD5
57134916752790943db9c4d3c0488e92
-
SHA1
7cde5ad5b7b11716534bf07e6a54178d841b4c49
-
SHA256
16a43aa836bfc334a9c67a4a6cbd25aa461b9332b7dbc5271afd75119c2a3521
-
SHA512
5f2be54e45aa06de736ee66c0552fd6e222038c5aa949188f96b03a18808f06221adf1bbdf68d94f76b76eecbdaad4e1a4fdb3434a029a476469c5e3a7063e8c
-
SSDEEP
24576:PznY32CV1u6juwCfDG8wA/8I1AGKBXVfW:TCnu6ufDGRWVXeVfW
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-