General
-
Target
e65e5f65b78555a62e8692443cbd4f5ec136d9f76e00645c63d4689fbe9fb239
-
Size
669KB
-
Sample
250226-d5sa5awkz5
-
MD5
d58b6f082bae9bb40004eadfb4937288
-
SHA1
8fc455416fef17bb4337f21d90364867c78848f1
-
SHA256
e65e5f65b78555a62e8692443cbd4f5ec136d9f76e00645c63d4689fbe9fb239
-
SHA512
07217335b67be498b6ba93440f174da9f9664706a1298c2f6c1173b3f59cf667942c02e249ca1561b36af3e5c8d2e70fa039577944e3ee974ca8280fdf1f6fa8
-
SSDEEP
12288:kKY3I/WD1wNOyOaqXg9wKK2ewrkABW1c7OCC/kgVbmzJewbb3wRrxP592Obhu4Ps:60lPqf1LRsImzJfbc3xJd/PWz
Static task
static1
Behavioral task
behavioral1
Sample
PO 10947.scr
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PO 10947.scr
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.al-subai.com - Port:
587 - Username:
[email protected] - Password:
information12 - Email To:
[email protected]
https://api.telegram.org/bot7236590670:AAEZk9ec6tcUIipI8D5VK8zyHeQjcafFyOY/sendMessage?chat_id=2052461776
Targets
-
-
Target
PO 10947.scr
-
Size
750KB
-
MD5
bbac3e04dd6ecf41684b9210d1a56780
-
SHA1
63995f9db174c00ff5b376539a941d2cd527d5cf
-
SHA256
b256e7a7a09ef8474a102c210f9a720614b7d37985922b7d62b17bf7aaed7ddd
-
SHA512
9f431a364e4a9701a3d167220a5efa6a0681f6fefc1883020cc9e9c33796db5ac90f3f4cc61b67d099ab3827ca84b429140c2be3f21c26f6dfd4374652c64b71
-
SSDEEP
12288:67383le9cizU+2KbNBaxnh38c4lVRCnYIbPsd6vU+pWts+9vuFCe:6L3VUp4aH8cMmnYJ6v7aoC
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-