General
-
Target
8ceadc4cdfe8f675b6c8e2ab188b76bbc89dc3e933364052eb6da188318b199f.exe
-
Size
1.1MB
-
Sample
250227-d8832svkz3
-
MD5
1be417b6a5ddfc0a5e0930ee4181a297
-
SHA1
2f351b981fea52def870f4ff6b04fc1742ac5d81
-
SHA256
8ceadc4cdfe8f675b6c8e2ab188b76bbc89dc3e933364052eb6da188318b199f
-
SHA512
99ed58c21ec6c288d73df21381f93a9e5f4f39ffc725c845f90c236146276b73cb6aca9b04c96fe0dacd9f459eedbc2b76bde62cc933596587c331ba09a5a87b
-
SSDEEP
24576:au6J33O0c+JY5UZ+XC0kGso6Faa14j+x7nhduHkVprMWY:su0c++OCvkGs9FaE42iH8p7Y
Static task
static1
Behavioral task
behavioral1
Sample
8ceadc4cdfe8f675b6c8e2ab188b76bbc89dc3e933364052eb6da188318b199f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ceadc4cdfe8f675b6c8e2ab188b76bbc89dc3e933364052eb6da188318b199f.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7418053275:AAEOSY1DuOetgv81Fz1cTR6zjk3nLw_p8Vg/sendMessage?chat_id=6595599138
Targets
-
-
Target
8ceadc4cdfe8f675b6c8e2ab188b76bbc89dc3e933364052eb6da188318b199f.exe
-
Size
1.1MB
-
MD5
1be417b6a5ddfc0a5e0930ee4181a297
-
SHA1
2f351b981fea52def870f4ff6b04fc1742ac5d81
-
SHA256
8ceadc4cdfe8f675b6c8e2ab188b76bbc89dc3e933364052eb6da188318b199f
-
SHA512
99ed58c21ec6c288d73df21381f93a9e5f4f39ffc725c845f90c236146276b73cb6aca9b04c96fe0dacd9f459eedbc2b76bde62cc933596587c331ba09a5a87b
-
SSDEEP
24576:au6J33O0c+JY5UZ+XC0kGso6Faa14j+x7nhduHkVprMWY:su0c++OCvkGs9FaE42iH8p7Y
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-