General
-
Target
03f9db415ed27b0483806ab6a9e797626303df87fac5fc4af2fba14516c26696.exe
-
Size
841KB
-
Sample
250215-w5xvqaymdw
-
MD5
70d13d2d755dde2d321725fc6ce87a3e
-
SHA1
7d73ee692607520e0d53e778b1e95ce54c81d0c0
-
SHA256
03f9db415ed27b0483806ab6a9e797626303df87fac5fc4af2fba14516c26696
-
SHA512
b45ab9c7fbbb449df1d6d1e51bb6f5136a7e4f3cfd300a3570cd4d71e9afac277d6943bcf0de5db319e908d412473af61e999b2a6cc3c82adc0335cac4e7a0f4
-
SSDEEP
12288:J7QBwSYKAdFsXvfijSa95gM6yvNrsnPciZnJupoUPG09F+QkrvRVNU+eCq4r3:H8OOnije7ylrsnPcCJuaUuow1rNyT4r3
Static task
static1
Behavioral task
behavioral1
Sample
03f9db415ed27b0483806ab6a9e797626303df87fac5fc4af2fba14516c26696.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03f9db415ed27b0483806ab6a9e797626303df87fac5fc4af2fba14516c26696.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk/sendMessage?chat_id=7319393351
Targets
-
-
Target
03f9db415ed27b0483806ab6a9e797626303df87fac5fc4af2fba14516c26696.exe
-
Size
841KB
-
MD5
70d13d2d755dde2d321725fc6ce87a3e
-
SHA1
7d73ee692607520e0d53e778b1e95ce54c81d0c0
-
SHA256
03f9db415ed27b0483806ab6a9e797626303df87fac5fc4af2fba14516c26696
-
SHA512
b45ab9c7fbbb449df1d6d1e51bb6f5136a7e4f3cfd300a3570cd4d71e9afac277d6943bcf0de5db319e908d412473af61e999b2a6cc3c82adc0335cac4e7a0f4
-
SSDEEP
12288:J7QBwSYKAdFsXvfijSa95gM6yvNrsnPciZnJupoUPG09F+QkrvRVNU+eCq4r3:H8OOnije7ylrsnPcCJuaUuow1rNyT4r3
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2