General
-
Target
1c015ce771fcaf5114418dda8f33c9d357e64de65c2ad89ba2088883a67af9b6.exe
-
Size
1.1MB
-
Sample
250215-c4bfjstkhw
-
MD5
40c0fe99692e7ff46bc1d69b11a5ea08
-
SHA1
1f63e2e0b1c17685558f67ef5d008b4358d2343e
-
SHA256
1c015ce771fcaf5114418dda8f33c9d357e64de65c2ad89ba2088883a67af9b6
-
SHA512
60c4a5ff652fd191f8cc5e4980a1230d2533250d93af198bc261e905b23ca23770056f93f666bf5fe221b81a27d55c969896eb4e59b54b10908ba9a5e7962e78
-
SSDEEP
24576:duaHUIf+9C5Fq22F7GI8DzoLv+hJNzim0CY8iMo6bt:0aHUIf9r2QDzoj6/g8iMJ
Static task
static1
Behavioral task
behavioral1
Sample
1c015ce771fcaf5114418dda8f33c9d357e64de65c2ad89ba2088883a67af9b6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1c015ce771fcaf5114418dda8f33c9d357e64de65c2ad89ba2088883a67af9b6.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk/sendMessage?chat_id=7319393351
Targets
-
-
Target
1c015ce771fcaf5114418dda8f33c9d357e64de65c2ad89ba2088883a67af9b6.exe
-
Size
1.1MB
-
MD5
40c0fe99692e7ff46bc1d69b11a5ea08
-
SHA1
1f63e2e0b1c17685558f67ef5d008b4358d2343e
-
SHA256
1c015ce771fcaf5114418dda8f33c9d357e64de65c2ad89ba2088883a67af9b6
-
SHA512
60c4a5ff652fd191f8cc5e4980a1230d2533250d93af198bc261e905b23ca23770056f93f666bf5fe221b81a27d55c969896eb4e59b54b10908ba9a5e7962e78
-
SSDEEP
24576:duaHUIf+9C5Fq22F7GI8DzoLv+hJNzim0CY8iMo6bt:0aHUIf9r2QDzoj6/g8iMJ
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2