General
-
Target
42781336b34e19cf5ef16046cbf56ab7ba0370f89343121c63cda774a40d3c2e
-
Size
9KB
-
Sample
250130-yqhhla1mg1
-
MD5
106cb2c2aceee1ec919b068ae22057a2
-
SHA1
3272ec6f158164238ae008747ce06d8dfb4f9112
-
SHA256
42781336b34e19cf5ef16046cbf56ab7ba0370f89343121c63cda774a40d3c2e
-
SHA512
b9e7a0439d800d2df0306f3387fecb69217867b9f114d8075c4ac903003df8727a2cc8a603db43ba0eeb9f68d679deaf4844e2bddb6e01cf4daf8ba08edf1f04
-
SSDEEP
192:YHFiRuRTGUPqkYZt/3MzkDYG32EqMyuTOgvZHd6INzBFee4jSEA7DHfV:89T4DIuYG32EAuT9xdpVF5zPHfV
Static task
static1
Behavioral task
behavioral1
Sample
Comprobante de pago__pdf.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Comprobante de pago__pdf.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot8181099166:AAHWiTz10g_-_BPRNk3yroxe3fl_IXTpU7s/sendMessage?chat_id=6250686237
Targets
-
-
Target
Comprobante de pago__pdf.exe
-
Size
19KB
-
MD5
4dcee6e4f297d24fad9454f56d9ee269
-
SHA1
dbf96d22cdfec813decbac5d54c07f3f20f543c8
-
SHA256
9aeacaff1f4ad8fa2b5c74318e05fce3827b3ab5cf7f54e286b43af5208c7140
-
SHA512
00c1794c2cd389d5300f220915999945cb76f50f401ed85594096c328e9fa95460520dc856bfdd064cc200878cc00c0470bf59789fda3bc7af835ded300ecd0b
-
SSDEEP
384:054nPRWVb6+m9M6qYuJY7te5ixNQfQxk1CxCvwN8:3JX+n6G/jDXvwN8
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-