General
-
Target
AWB5305323204643.exe
-
Size
1.3MB
-
Sample
250227-rb8b5syxdz
-
MD5
b45fdcd6c8fa31e0adf5f4f91c052c39
-
SHA1
63a58e43ee53a0a2dfd04306cc3298f84a7be60b
-
SHA256
0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f
-
SHA512
21dffa4dfbcdf64abc3ab9f14db8a174505f4fe9c3d47dfe4a1eac55bac68f9ec59f68dfa6d5a3e9d2958c5cfc9dc8bf06e4aa30abde49655693f91f725216eb
-
SSDEEP
24576:SV5dPaGXy3pto7WqBtRpcG9tDmBNf3fxY1pORoSfg9i+2FjC:ElyZtoSqlpHLmXf32vORoSo9i+2
Static task
static1
Behavioral task
behavioral1
Sample
AWB5305323204643.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AWB5305323204643.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7552206830:AAGZUrvJgSRgT_tfVCG5NR-NdC35UuRR1yg/sendMessage?chat_id=6357516296
Targets
-
-
Target
AWB5305323204643.exe
-
Size
1.3MB
-
MD5
b45fdcd6c8fa31e0adf5f4f91c052c39
-
SHA1
63a58e43ee53a0a2dfd04306cc3298f84a7be60b
-
SHA256
0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f
-
SHA512
21dffa4dfbcdf64abc3ab9f14db8a174505f4fe9c3d47dfe4a1eac55bac68f9ec59f68dfa6d5a3e9d2958c5cfc9dc8bf06e4aa30abde49655693f91f725216eb
-
SSDEEP
24576:SV5dPaGXy3pto7WqBtRpcG9tDmBNf3fxY1pORoSfg9i+2FjC:ElyZtoSqlpHLmXf32vORoSo9i+2
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-