General
-
Target
74dc085009049a3a2d749cc567e7551d30d00419a486cbec1a720194e1928294
-
Size
933KB
-
Sample
250218-n5qseaznhq
-
MD5
79e80cd68a6e248c3fbf151c3ec7cc96
-
SHA1
0058bd8e8741b39a272da9dea9cba7e64cdb408c
-
SHA256
74dc085009049a3a2d749cc567e7551d30d00419a486cbec1a720194e1928294
-
SHA512
89418fc23cb719e1e8c7f745f21326727690ef7a9824c59259da0921e03ee676df4878c0475fa051392cd0a82c6e7134dfa55225017114e193c30940c45b8eec
-
SSDEEP
24576:wbHtJWagqrkUGlxBtEtXwcC3XDf1ddAoR:wbbbRglx2AcCn5bAoR
Static task
static1
Behavioral task
behavioral1
Sample
Polylogy.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Polylogy.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
Targets
-
-
Target
Polylogy.exe
-
Size
990KB
-
MD5
7661aaf5dbaccb77ebf948bc69b5725d
-
SHA1
791ccb6267488a0d86891ae25be93a36a6b5bedd
-
SHA256
510877d9cee23c4fc8a3f0a96b12a175f1dbe887978f43499eb1cc2d05571ffb
-
SHA512
19cad72428ed242a9c5d743ade6ed3486a8d2454cd98d555d2b2df3f77848162bf1a1dbba0bbfd8d5f39676ff0d82dc0ea87efa73a80f9680eaad7ba7a5eb7c0
-
SSDEEP
24576:IGhzpxfOytYgk/ZLpIK3MrFNbMUqkpg7bII6vJ2FYMU07m1iQ:zrKz/irFNb+k2bsxTt8mkQ
-
Guloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
b853d5d2361ade731e33e882707efc34
-
SHA1
c58b1aeabdf1cbb8334ef8797e7aceaa7a1cb6be
-
SHA256
f0cd96e0b6e40f92ad1aa0efacde833bae807b92fca19bf062c1cf8acf29484b
-
SHA512
8ea31d82ffa6f58dab5632fe72690d3a6db0be65aec85fc8a1f71626773c0974dcebefae17bcf67c4c56ef442545e985eea0b348ff6e4fc36740640092b08d69
-
SSDEEP
192:eA2HS+ihg200uWz947Wzvxu6v0MI7JOde+Ij5Z77dslFsEf:mS62Gw947ExuGDI7J8EF7KIE
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2