General
-
Target
Swift Message_30_01_2025.exe.v
-
Size
924KB
-
Sample
250131-d6gwsazmhp
-
MD5
bbc664f873b435fe9a4b3bc437b5e496
-
SHA1
65a58786ed3040b2e46d2e77e45a678ab93765b9
-
SHA256
975f788c146d6a8c1361b5ec4bdbd11ccd97dea1b3067cc1bea496d07a05ff8d
-
SHA512
143061c6403ed9b3ad4acdf8fe6a9de9d9b9bad3d9e061b6ec1484c448b7470d47bb639218dfae81f8f6eeb2297c82d257d0306c58901e8c072cfa4040958078
-
SSDEEP
12288:BzUM8H4rz4pMBquEcrNNZb8uqY22RJCavgYGOKcaXusNRxLx8xR:FUMpApZCN5aY2szvgZXusTxL6
Static task
static1
Behavioral task
behavioral1
Sample
Swift Message_30_01_2025.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Swift Message_30_01_2025.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.ruchiraprinting.com - Port:
587 - Username:
[email protected] - Password:
Ruchira@PR12 - Email To:
[email protected]
Targets
-
-
Target
Swift Message_30_01_2025.exe.v
-
Size
924KB
-
MD5
bbc664f873b435fe9a4b3bc437b5e496
-
SHA1
65a58786ed3040b2e46d2e77e45a678ab93765b9
-
SHA256
975f788c146d6a8c1361b5ec4bdbd11ccd97dea1b3067cc1bea496d07a05ff8d
-
SHA512
143061c6403ed9b3ad4acdf8fe6a9de9d9b9bad3d9e061b6ec1484c448b7470d47bb639218dfae81f8f6eeb2297c82d257d0306c58901e8c072cfa4040958078
-
SSDEEP
12288:BzUM8H4rz4pMBquEcrNNZb8uqY22RJCavgYGOKcaXusNRxLx8xR:FUMpApZCN5aY2szvgZXusTxL6
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-