General
-
Target
NewPO127429.exe
-
Size
522KB
-
Sample
250220-rdladswqbl
-
MD5
d30b1c7244ad844dab07ba6116385ce5
-
SHA1
e72b8f67a33b9acb2c52c8feb1bc3f61e801054e
-
SHA256
063da58edb72802cf74c1c113fe4107ede937b346b066356158d38724d13c1c8
-
SHA512
c874f5ea5d6c6081e11ebe98a8670bf37b34e8e11fa715ab99c7a3339ccd21731d65860696c04c81e078f6508cd722222c6d51a1d4ed883857837347183ba5a9
-
SSDEEP
12288:5quErHF6xC9D6DmR1J98w4oknqOOCyQfFRZWzsSnBFxNrn6IZjX:Mrl6kD68JmlotQfFyVnBFxNr6IZL
Behavioral task
behavioral1
Sample
NewPO127429.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NewPO127429.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
ifSg^KL6 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
ifSg^KL6
Targets
-
-
Target
NewPO127429.exe
-
Size
522KB
-
MD5
d30b1c7244ad844dab07ba6116385ce5
-
SHA1
e72b8f67a33b9acb2c52c8feb1bc3f61e801054e
-
SHA256
063da58edb72802cf74c1c113fe4107ede937b346b066356158d38724d13c1c8
-
SHA512
c874f5ea5d6c6081e11ebe98a8670bf37b34e8e11fa715ab99c7a3339ccd21731d65860696c04c81e078f6508cd722222c6d51a1d4ed883857837347183ba5a9
-
SSDEEP
12288:5quErHF6xC9D6DmR1J98w4oknqOOCyQfFRZWzsSnBFxNrn6IZjX:Mrl6kD68JmlotQfFyVnBFxNr6IZL
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-