General
-
Target
59feca703bbe5b155c79ff9fef0738aa92ec174603a8e7b2b547bf05b79764ef
-
Size
735KB
-
Sample
250219-ehjwxawpfl
-
MD5
5703525b77cc01dfdcd19a0ec060b5f2
-
SHA1
33444bac1f1cf3547c9ce71f688d2cd357dc58ab
-
SHA256
59feca703bbe5b155c79ff9fef0738aa92ec174603a8e7b2b547bf05b79764ef
-
SHA512
d5dd1a22f783763f4f09e687dea8250f82b6691ef7cf896767708a7fd5c89f6273cffa30dee9a205d767e5b97d3170b7faae88cfdc06a684d8950b0ccc3bfd2c
-
SSDEEP
12288:IN+HZEI7DxvuhzpGjeYfTM9uSnY1LUyDVtBab1/RDLEFYgAEYBPRuwxnlGxgF:mIh0hIjfbUlYK/hEFYgOPRRxn8OF
Static task
static1
Behavioral task
behavioral1
Sample
PO#241338.scr
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PO#241338.scr
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.al-subai.com - Port:
587 - Username:
[email protected] - Password:
information12 - Email To:
[email protected]
https://api.telegram.org/bot7236590670:AAEZk9ec6tcUIipI8D5VK8zyHeQjcafFyOY/sendMessage?chat_id=2052461776
Targets
-
-
Target
PO#241338.scr
-
Size
916KB
-
MD5
1f9a219a3d4f7c497c3f6d6cb47bcc77
-
SHA1
064ee4b1212e99be9857020c63726fa3aa88c079
-
SHA256
105bcf11c1495556915d031574274e27a636b1e32f6b45a22bdb440ec1796b66
-
SHA512
c5639c4f6a4b5670347b6a735c3f979c8b03ba2f7574080ef775eaab8b522e986dc25c80299a910282b9ad03444bccd7cb468d8e8aaf6a6da44ce452e85136bb
-
SSDEEP
24576:FMRHPv6tkV37EUl8T5UfupJvjniUNsiQMRH:FMZqaV3Vl842vbZTQMZ
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-