General
-
Target
24022025_1639_24022025_Ems_inquiry_catalogues.7z
-
Size
1.3MB
-
Sample
250224-t5q13aspt7
-
MD5
4abbb59f2a25ee906b104e7fadb8d915
-
SHA1
cd9ba032cbdd7a5251e51f0febbfcb68d8e83a1d
-
SHA256
e744231336744aa7cb7abcb25fd532ca299a9ca9f1f6d62a4c331d398739f84c
-
SHA512
510b49e705502c07805fb8696e6c0702e441a060061095f2b087efe2a7879e9e51bc8a425b6007cb03c7629cee87c3dc7deaef73079966c50e03ed2272a60470
-
SSDEEP
24576:dehlfmznd8Olkjh7pMLoFc3e/PIvHsj1ziinBBGgad8N04zXihts0B:AbfgndrWjhpMKmaKHM1zjXGgxN3zSv
Static task
static1
Behavioral task
behavioral1
Sample
Ems_inquiry_catalogues.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ems_inquiry_catalogues.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7538945541:AAEDj6WLyaeZtSruFCTvcpwTwP6sVcHPzO4/sendMessage?chat_id=6098953234
Targets
-
-
Target
Ems_inquiry_catalogues.exe
-
Size
1.7MB
-
MD5
3018e9591f54c3dc959ac9834995b9b6
-
SHA1
a50b74eb202a1c55362d6b7931fe56b7c0bb4312
-
SHA256
0baecb92b8e375afe7db841b521040f731c923e5919fc23f42be91973366a83c
-
SHA512
7a0cfb1d0f6bef45c759de73ec9fcb0b8c2ae17fedcacb0e201f8925dd79299bded7c62a360e0fc1f2b44073461576876076302b73cadfc7bc5a4659cbc906c2
-
SSDEEP
24576:ELFZHUCS4BarJd8clGjBJpWLqrc3m5P+v3Ej1ZiCn7HGEah8n0WzxUmLTPZCK5Oz:EhSzJdLsjrpWEmKk3E1ZNDGE3nrzpTop
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-