General
-
Target
8ae6a492bc65fc07707bfc0f43d01604fc234d4d05b5e7e5df3d78bc89a36f3a.exe
-
Size
1.2MB
-
Sample
250201-nlyznsskbm
-
MD5
9de18c615b2177e7c6fb20b1871c0f4a
-
SHA1
219891d5ecfe28d4240f025558b6643d7ffb602d
-
SHA256
8ae6a492bc65fc07707bfc0f43d01604fc234d4d05b5e7e5df3d78bc89a36f3a
-
SHA512
e909ab8f37da41eb3ecf13286bb2836e3e1f4549d3ac42ced2650f5717d5718de2a629b22cee89eb809fc6dc6a59f4dac23afef5ea0350a8dd5f89d9cf3b5870
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaC4hxy+P4m2HrtKtD0HUqM0:7JZoQrbTFZY1iaC4i+eLtKqF
Static task
static1
Behavioral task
behavioral1
Sample
8ae6a492bc65fc07707bfc0f43d01604fc234d4d05b5e7e5df3d78bc89a36f3a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8ae6a492bc65fc07707bfc0f43d01604fc234d4d05b5e7e5df3d78bc89a36f3a.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Global786@ - Email To:
[email protected]
https://api.telegram.org/bot8066712820:AAEAb01u8B6eDO5xCMdAz6XCOHC_L2RpVGo/sendMessage?chat_id=7667424178
Targets
-
-
Target
8ae6a492bc65fc07707bfc0f43d01604fc234d4d05b5e7e5df3d78bc89a36f3a.exe
-
Size
1.2MB
-
MD5
9de18c615b2177e7c6fb20b1871c0f4a
-
SHA1
219891d5ecfe28d4240f025558b6643d7ffb602d
-
SHA256
8ae6a492bc65fc07707bfc0f43d01604fc234d4d05b5e7e5df3d78bc89a36f3a
-
SHA512
e909ab8f37da41eb3ecf13286bb2836e3e1f4549d3ac42ced2650f5717d5718de2a629b22cee89eb809fc6dc6a59f4dac23afef5ea0350a8dd5f89d9cf3b5870
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaC4hxy+P4m2HrtKtD0HUqM0:7JZoQrbTFZY1iaC4i+eLtKqF
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-