General
-
Target
38362934d3426edd96481fe2dcd677b78cae724f402c003f7f7d7cff8faf7cbfN.exe
-
Size
841KB
-
Sample
250216-jj2kkayndn
-
MD5
073ef470745f82538e690079edd1ee50
-
SHA1
88b618cd176828f0972674b449b12d8cf4d9fb0e
-
SHA256
38362934d3426edd96481fe2dcd677b78cae724f402c003f7f7d7cff8faf7cbf
-
SHA512
a8a3e5192954c55d1ccf414671df2daa53f9a59793d363d0999330d12e9c79f7e7e974333e5b0d9882ecbe6f939a0e046717cafef50807ec743356a893d7fc96
-
SSDEEP
12288:J7QBwSYKAdFsXvfijSa95gM6yvNrsnPciZnJupoUPG09F+QkrvRVNU+eCq4r:H8OOnije7ylrsnPcCJuaUuow1rNyT4r
Static task
static1
Behavioral task
behavioral1
Sample
38362934d3426edd96481fe2dcd677b78cae724f402c003f7f7d7cff8faf7cbfN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
38362934d3426edd96481fe2dcd677b78cae724f402c003f7f7d7cff8faf7cbfN.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk/sendMessage?chat_id=7319393351
Targets
-
-
Target
38362934d3426edd96481fe2dcd677b78cae724f402c003f7f7d7cff8faf7cbfN.exe
-
Size
841KB
-
MD5
073ef470745f82538e690079edd1ee50
-
SHA1
88b618cd176828f0972674b449b12d8cf4d9fb0e
-
SHA256
38362934d3426edd96481fe2dcd677b78cae724f402c003f7f7d7cff8faf7cbf
-
SHA512
a8a3e5192954c55d1ccf414671df2daa53f9a59793d363d0999330d12e9c79f7e7e974333e5b0d9882ecbe6f939a0e046717cafef50807ec743356a893d7fc96
-
SSDEEP
12288:J7QBwSYKAdFsXvfijSa95gM6yvNrsnPciZnJupoUPG09F+QkrvRVNU+eCq4r:H8OOnije7ylrsnPcCJuaUuow1rNyT4r
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2