General
-
Target
pre-alert.zip
-
Size
1022KB
-
Sample
250219-k1q1tsxrdm
-
MD5
cf28ee1e0bc7e557fd06fd89e3cb5b0c
-
SHA1
af655d2b91a0a607184760daeef1aa2e55cf78a5
-
SHA256
b5ef552757eeaf4d9be10ad82153244d76f8e8d065494759ff77fcbdabb68f26
-
SHA512
d636063c8e97564a2964814b26dff5ea1e55f8bea16fd8f54ddc38e491daf09f5c4fc00699fb27a11a7da58e2e4ec4b431e39fb71e17d8999f2ddc1c1d228bd6
-
SSDEEP
24576:c6accOKKsN3EZqbB4lL+W+7EQn8eN7VtyD1wgqxxfuhYNIYYd:BvrzOUZqbB9hEQ8ctyD1wgWZuyNIYYd
Static task
static1
Behavioral task
behavioral1
Sample
pre-alert.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
pre-alert.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
webmail.gvictery.com - Port:
25 - Username:
[email protected] - Password:
Hong1357@J - Email To:
[email protected]
https://api.telegram.org/bot7452517787:AAFRCQzX_IamMx-kAJG8lXDhSv2cnnBqR7U/sendMessage?chat_id=7256026967
Targets
-
-
Target
pre-alert.exe
-
Size
1.2MB
-
MD5
aedc7ecabe46230d60a8059c86ddda08
-
SHA1
236dfa67dd9cd0c01500aa0a04c80aa3ca577d1c
-
SHA256
f9925fbe9ba09a653092fabbcf4b097e46651f500ae7cfaf1f68515168b333c5
-
SHA512
e26c1bece49d319a3777291fd94ba3fefd364940a2cb06cfc3a6cdc8a781c2aee5402db0cadd4d4a5780463662642ece5bec0fc3647103e6633ace07a16fc352
-
SSDEEP
24576:tq5eIN453LV5B4v/cug7em7x0XsC6jjR5yPDNFo2s0O8BD48rWHFDW+1RUrK:vIN2Z5B5zem7x0TY5yPDfoL0O8BD48rC
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-