MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 161a1575e84ea9637ad7d7905c008f06b2146dc5d46bb44b76763601d26c39e6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



VIPKeylogger


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: 161a1575e84ea9637ad7d7905c008f06b2146dc5d46bb44b76763601d26c39e6
SHA3-384 hash: 88e7c3ba36ba478d950c838070e5df2bf156b77eb92724766efd5d6e584f14d235d4c8bd9850a481964a7608c9561db7
SHA1 hash: defec002468baf172e0c479ff5f954fe3308fa02
MD5 hash: 6d2c2d36a874614c134008f446748f1c
humanhash: ack-enemy-foxtrot-green
File name:161a1575e84ea9637ad7d7905c008f06b2146dc5d46bb44b76763601d26c39e6
Download: download sample
Signature VIPKeylogger
File size:751'416 bytes
First seen:2025-12-08 15:08:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e2a592076b17ef8bfb48b7e03965a3fc (398 x GuLoader, 59 x RemcosRAT, 45 x AgentTesla)
ssdeep 12288:RobLq6yJj7QvQPgYi3Nz61l7jf6IDPUfNz6kLvhBPzLE:KbLPyJj7QvQPgYi3FCxjTDsfNzp37g
Threatray 2'350 similar samples on MalwareBazaar
TLSH T100F427C2684087D6DC6BF2F2A4DA54380AD66CED91E551896EF5725D00F1AFBCC2E83C
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter adrian__luca
Tags:exe signed VIPKeylogger

Code Signing Certificate

Organisation:Supersensitizations
Issuer:Supersensitizations
Algorithm:sha256WithRSAEncryption
Valid from:2025-09-21T23:40:16Z
Valid to:2026-09-21T23:40:16Z
Serial number: 31da81c462b50eb016aa7a3deef4ce813d33efef
Thumbprint Algorithm:SHA256
Thumbprint: 34a3322a1f8ada35a51bcd21c53dd7512983959619be2acefdbb227aa2232107
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
HU HU
Vendor Threat Intelligence
Malware configuration found for:
GuLoader NSIS
Details
GuLoader
a c2 URL, a useragent string, and a string XOR key
GuLoader
an XOR decryption key and an extracted component
NSIS
extracted archive contents
Malware family:
n/a
ID:
1
File name:
161a1575e84ea9637ad7d7905c008f06b2146dc5d46bb44b76763601d26c39e6
Verdict:
Malicious activity
Analysis date:
2025-12-08 20:44:44 UTC
Tags:
evasion snake keylogger telegram stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
injection obfusc virus
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug blackhole guloader installer installer installer-heuristic microsoft_visual_cc nsis overlay signed
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-11-18T06:00:00Z UTC
Last seen:
2025-12-10T10:28:00Z UTC
Hits:
~1000
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable NSIS Installer PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.GuLoader
Status:
Malicious
First seen:
2025-11-18 10:37:23 UTC
File Type:
PE (Exe)
Extracted files:
20
AV detection:
22 of 36 (61.11%)
Threat level:
  5/5
Result
Malware family:
vipkeylogger
Score:
  10/10
Tags:
family:guloader family:vipkeylogger collection discovery downloader keylogger spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses Microsoft Outlook profiles
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Guloader family
Guloader,Cloudeye
VIPKeylogger
Vipkeylogger family
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
161a1575e84ea9637ad7d7905c008f06b2146dc5d46bb44b76763601d26c39e6
MD5 hash:
6d2c2d36a874614c134008f446748f1c
SHA1 hash:
defec002468baf172e0c479ff5f954fe3308fa02
SH256 hash:
2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
MD5 hash:
a4dd044bcd94e9b3370ccf095b31f896
SHA1 hash:
17c78201323ab2095bc53184aa8267c9187d5173
SH256 hash:
8dc2be6679497994e3ddc97bc7bc1ce2b3c17ef3528b03ded6696ef198a11d10
MD5 hash:
0c44f21d4afc81cc99fac7cc35e4503a
SHA1 hash:
3d0d5c684df99a46510c0e2c0020163a9d11c08d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_NSIS_Nullsoft_Installer
Author:Obscurity Labs LLC
Description:Detects NSIS installers by .ndata section + NSIS header string
Rule name:PE_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments