General
-
Target
2552ad0ace3e621451f2878607d55eaa1a947b6506b4d573118f02057a85ed76.exe
-
Size
974KB
-
Sample
250228-cn9cmsylx7
-
MD5
783e80f04423694cd8eee98ab46cbafe
-
SHA1
ddf36a4f83180aee96cd2329155510836d7c8b56
-
SHA256
2552ad0ace3e621451f2878607d55eaa1a947b6506b4d573118f02057a85ed76
-
SHA512
b99a72de9b338b05804edd6f3f88716e28cf46be522add089f93260afa0d89d62e6a118ca0e7c89b1bffc3d23094da9154f07e551cd8713f84f60b18d319f764
-
SSDEEP
12288:f018r7wD3HYrWyIXBoDhoBCAxSr0fFC0WYxc6s8k4dnrR5O/4FLmMniKnwGsOlMC:futyAuGXfIMxLA4xeAmMniPTLhjI
Static task
static1
Behavioral task
behavioral1
Sample
2552ad0ace3e621451f2878607d55eaa1a947b6506b4d573118f02057a85ed76.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2552ad0ace3e621451f2878607d55eaa1a947b6506b4d573118f02057a85ed76.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk/sendMessage?chat_id=7319393351
Targets
-
-
Target
2552ad0ace3e621451f2878607d55eaa1a947b6506b4d573118f02057a85ed76.exe
-
Size
974KB
-
MD5
783e80f04423694cd8eee98ab46cbafe
-
SHA1
ddf36a4f83180aee96cd2329155510836d7c8b56
-
SHA256
2552ad0ace3e621451f2878607d55eaa1a947b6506b4d573118f02057a85ed76
-
SHA512
b99a72de9b338b05804edd6f3f88716e28cf46be522add089f93260afa0d89d62e6a118ca0e7c89b1bffc3d23094da9154f07e551cd8713f84f60b18d319f764
-
SSDEEP
12288:f018r7wD3HYrWyIXBoDhoBCAxSr0fFC0WYxc6s8k4dnrR5O/4FLmMniKnwGsOlMC:futyAuGXfIMxLA4xeAmMniPTLhjI
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2