General
-
Target
-5kOa04HngN_uuWp-JabSOnRD0m7_QIqK42a6ubjT3w.bin
-
Size
195KB
-
Sample
250129-tfs45a1ldq
-
MD5
4fcf27b194d0997483c980ad25f1683d
-
SHA1
e131dc4b02849d099b277c0af6fba06ac4d11c61
-
SHA256
ff990e6b4e079e037ebae5a9fc969b48e9d10f49bbf9022a2b8d9aeae6e34f7c
-
SHA512
78cb6bf0f768a42f8a403c2e0d624f6dcc9226ef67175b6ea1cbb56d405457d181a9959e4bead79cfc91392a5762c3cfd8d3f726e6202ac7ba6939e7ad5f4f1b
-
SSDEEP
6144:xCvif6qyi8k+aL8P6MOMNzGuaqNdZ379ex+TueS:xkiA6GzG3v+69
Static task
static1
Behavioral task
behavioral1
Sample
-5kOa04HngN_uuWp-JabSOnRD0m7_QIqK42a6ubjT3w.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
-5kOa04HngN_uuWp-JabSOnRD0m7_QIqK42a6ubjT3w.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7706553173:AAGUylkmi091gvfpwsORBj1aZWexb0cAd6Y/sendMessage?chat_id=5302361040
Targets
-
-
Target
-5kOa04HngN_uuWp-JabSOnRD0m7_QIqK42a6ubjT3w.bin
-
Size
195KB
-
MD5
4fcf27b194d0997483c980ad25f1683d
-
SHA1
e131dc4b02849d099b277c0af6fba06ac4d11c61
-
SHA256
ff990e6b4e079e037ebae5a9fc969b48e9d10f49bbf9022a2b8d9aeae6e34f7c
-
SHA512
78cb6bf0f768a42f8a403c2e0d624f6dcc9226ef67175b6ea1cbb56d405457d181a9959e4bead79cfc91392a5762c3cfd8d3f726e6202ac7ba6939e7ad5f4f1b
-
SSDEEP
6144:xCvif6qyi8k+aL8P6MOMNzGuaqNdZ379ex+TueS:xkiA6GzG3v+69
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-