General
-
Target
swift_____.rar
-
Size
686KB
-
Sample
250328-sfsypazjy5
-
MD5
e228466f3c99e63483a4b58f95661582
-
SHA1
642e298a9e3b6fe4dc5f8de3bc24f6290c1e16ce
-
SHA256
a00984beafc2ba1344ed0591dc8a0426e331f97c0eed001463488cc57d3a85b8
-
SHA512
ec40057bb313a77217c0dd9cb7c7fe30bdbe0d567808879e594a8717f9bee59f3e64ac14e9b3d51af16647784d4a98814d7105d37787d38e0661325b7c538875
-
SSDEEP
12288:BlU4mBxIUHJwt9UTpqFf2ER3tPhJAj3cmDFS7+3kCbWEq7NYsl+8D3BD8SWQZ5yk:P3mBxIfUN02EHPADtRA+3VWDxY6+8Dxh
Static task
static1
Behavioral task
behavioral1
Sample
swift_____.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
swift_____.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
webmail.mupa.com.tr - Port:
587 - Username:
[email protected] - Password:
$Rc9Ff8y - Email To:
[email protected]
Targets
-
-
Target
swift_____.exe
-
Size
734KB
-
MD5
9f733c141f4f78ac2644834200fd43b4
-
SHA1
10f1a56256f872acc61d821916f6896179e3d250
-
SHA256
64fa1206bbcea92b9972cf15fc10e42fd87170087262ebc56a0fb8573488c163
-
SHA512
601e20d772940dc77e23fb1a10645f723dcbc12b450c0f3b2434509c650342f9dfffd0decc3403052b1c3ccb814f0aaf6b8d7b8ba179bda55983078d7bc71bc9
-
SSDEEP
12288:88QiKaxkuR+KbvJcI8mJHkgfMxqQKHvD/GpsEt3+eFCYoZFBuGLwQAH:XQiOu1TJ78YkgU8QKLeCjZHNm
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-