General
-
Target
9645096bc9e53a83a9aaa69a13c82fea38c8719faf27298afd25892bd9f788ec.rar
-
Size
3.6MB
-
Sample
250224-lnmnbavpt3
-
MD5
8758b53f36c2aea61ac9fd05bd639f2a
-
SHA1
a7e9cf336e16f7305bbc5bb65bc8c292da186a15
-
SHA256
9645096bc9e53a83a9aaa69a13c82fea38c8719faf27298afd25892bd9f788ec
-
SHA512
cfdd89553b3e670cc2bab45069cab7b2c639996809962b6c1252eb9adda679a91f7f3840ec580159a5eb3890482355426e66d74b3243c99031ee88a1be4cca97
-
SSDEEP
98304:phWlB/fA5eSshKViWvuKBC2aMsicrcOr4qdVT4zK:pCu5c8cVKBvTcrzVT4zK
Static task
static1
Behavioral task
behavioral1
Sample
01NEW_PURCHASE_ORDER_654576554.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01NEW_PURCHASE_ORDER_654576554.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
libvlc.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
libvlc.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
libvlccore.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
libvlccore.dll
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7518188422:AAHmsiSJGbuq2bkotqlSAYxEVWayoAQB6Rw/sendMessage?chat_id=5210110905
Targets
-
-
Target
01NEW_PURCHASE_ORDER_654576554.exe
-
Size
969KB
-
MD5
f9538485432d3ec640f89096ba2d4d00
-
SHA1
b050b847b1fe8be78d56b29bd23c25e05c227a92
-
SHA256
5d695d8a0bb1d919cc77a2aa2488a61797bfa065238160278ee458120630aaf9
-
SHA512
ea7aeedd15f4d6a6005f8cfb7d404dfb0c302c837e48de7e3ff44d7d5908f8de6c0a81f736d874a491eddc89fdf753976be6f635e7e8512f5abb7f32caa8cfc5
-
SSDEEP
24576:oFZAiQHDhht8m7FpUi1L1OXJz5zzz3zzzozzz3zzzNz:CZAiQHlhtz7FpWdwz
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
libvlc.dll
-
Size
5.4MB
-
MD5
e339e11223bb5e4ed51e7112dfa617da
-
SHA1
510687d976c6253cb8b3569d71aaf85a2c69ee70
-
SHA256
eeb4c6dd889c40d8b95ee00f2eff67a5d3e0d4a15034ab97a36662599b2e4f3e
-
SHA512
aad3586e35bda596ccfad245856f5a59467b0a3ecc14ef39bc2dbda4e830038eaf80cacb62cdcf7dccdbc1982f72974ef21553a56f35a940657197655a7c34f2
-
SSDEEP
49152:zUFv9Z4I+GBdNKgLLkFTaTMXWDIIWVAGe/IBlHelcPJOOr5V3P0jYThYFj52JPwW:omG8W2ZAGe/IBlGcPzi5W6P4a+GLQ1
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
libvlccore.dll
-
Size
2.7MB
-
MD5
c62c3ef5753af6e0980f38eebc196b1c
-
SHA1
fd1d62feaaacb7cad5f952b61a6f7bd60d6dc4e1
-
SHA256
2ddb85b36650f85b5a09724c5b17428b1b1b76bd3e3dd85b643933659d5e333d
-
SHA512
f2338d26b073d8a796a7a19ee290b87b63f30f6cfa62e74d147756d2362898a167784c860d9bc098b1ec1a080aaa0fad25ca8c611b7e8f42ea8195c2b14abdfc
-
SSDEEP
49152:0F0rn/mnSnjfazU2TGlMo1PBAUZLY6sEZGaXBuQQ9eI:0F07L60PBAUZL3W
Score1/10 -