MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3014fe96ba09009c9717c930855baf4cfaba24db90ec6f6004daa619d5c07395. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



VIPKeylogger


Vendor detections: 15


Intelligence 15 IOCs YARA 5 File information Comments

SHA256 hash: 3014fe96ba09009c9717c930855baf4cfaba24db90ec6f6004daa619d5c07395
SHA3-384 hash: ee09542b2be19950337de12a08b276dcfc97ad7825298659a9f868df38c8d2e00956d6bf47181fdc889c20576dfb3a91
SHA1 hash: 8c9b9026b31346ffea0c19c5c7d563b48dd27ca2
MD5 hash: b327740d9d0c50712d16aa7aa40f02a8
humanhash: india-fillet-social-montana
File name:RFQ-INQUIRY#46883-A24.exe
Download: download sample
Signature VIPKeylogger
File size:1'895'424 bytes
First seen:2025-02-20 10:34:06 UTC
Last seen:2025-02-20 10:36:09 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'658 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 24576:sDCnYFij7OVei5g+YIgxMy32uc9qye441eU4yYSkMmWKH5G/N:sDHF95rg4uc9an49KC5G/N
Threatray 2'115 similar samples on MalwareBazaar
TLSH T13995E187B6485969D2A74F33D4D2BA3047E5DF715F77EF59009008E90A1A383E9E2A33
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10522/11/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
File icon (PE):PE icon
dhash icon f0ccf0d44cb8c4e0 (1 x SnakeKeylogger, 1 x VIPKeylogger)
Reporter lowmal3
Tags:exe VIPKeylogger

Intelligence


File Origin
# of uploads :
2
# of downloads :
454
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
RFQ-INQUIRY#46883-A24.exe
Verdict:
Malicious activity
Analysis date:
2025-02-20 10:37:09 UTC
Tags:
snake keylogger evasion telegram purecrypter netreactor smtp stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
autorun snake
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% directory
Сreating synchronization primitives
DNS request
Connection attempt
Sending an HTTP GET request
Sending a custom TCP request
Reading critical registry keys
Creating a window
Stealing user critical data
Enabling autorun by creating a file
Forced shutdown of a browser
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated packed smartassembly
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Snake Keylogger, VIP Keylogger
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Drops VBS files to the startup folder
Found malware configuration
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1619844 Sample: RFQ-INQUIRY#46883-A24.exe Startdate: 20/02/2025 Architecture: WINDOWS Score: 100 23 reallyfreegeoip.org 2->23 25 api.telegram.org 2->25 27 3 other IPs or domains 2->27 35 Suricata IDS alerts for network traffic 2->35 37 Found malware configuration 2->37 39 Malicious sample detected (through community Yara rule) 2->39 45 12 other signatures 2->45 7 RFQ-INQUIRY#46883-A24.exe 15 5 2->7         started        12 wscript.exe 1 2->12         started        signatures3 41 Tries to detect the country of the analysis system (by using the IP) 23->41 43 Uses the Telegram API (likely for C&C communication) 25->43 process4 dnsIp5 29 mail.ladangharbalenterprise.com 162.251.80.117, 49807, 49956, 587 PUBLIC-DOMAIN-REGISTRYUS United States 7->29 31 api.telegram.org 149.154.167.220, 443, 49765, 49915 TELEGRAMRU United Kingdom 7->31 33 2 other IPs or domains 7->33 17 C:\Users\user\AppData\...\eplorerers.exe, PE32 7->17 dropped 19 C:\Users\...\eplorerers.exe:Zone.Identifier, ASCII 7->19 dropped 21 C:\Users\user\AppData\...\eplorerers.vbs, ASCII 7->21 dropped 47 Tries to steal Mail credentials (via file / registry access) 7->47 49 Drops VBS files to the startup folder 7->49 51 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->51 53 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->53 14 eplorerers.exe 14 2 12->14         started        file6 signatures7 process8 signatures9 55 Multi AV Scanner detection for dropped file 14->55 57 Tries to steal Mail credentials (via file / registry access) 14->57 59 Tries to harvest and steal browser information (history, passwords, etc) 14->59
Threat name:
Win32.Ransomware.Generic
Status:
Malicious
First seen:
2025-02-19 16:52:06 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
vipkeylogger
Score:
  10/10
Tags:
family:vipkeylogger collection discovery keylogger spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
outlook_office_path
outlook_win_path
Browser Information Discovery
System Location Discovery: System Language Discovery
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Drops startup file
Reads user/profile data of local email clients
Reads user/profile data of web browsers
VIPKeylogger
Vipkeylogger family
Verdict:
Malicious
Tags:
Win.Packed.Msilheracles-10017859-0 404keylogger
YARA:
n/a
Unpacked files
SH256 hash:
5fffcd5fc38399055c599a1094f1896112eac17226aa8d68e5583fb1374d8302
MD5 hash:
3d2a2a05318178e414bc6fef55f614dc
SHA1 hash:
4a24b21433a738401f44f3ddc5744825e4185384
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
9975c9c8532327a0537970066d8b43a82ff566f7aad3967e3516a8f41577b671
MD5 hash:
97fb134b87ea47a772629370b42f36f0
SHA1 hash:
71eb247db7c5a6620fb43eccfd5eef5c0efdb591
SH256 hash:
3014fe96ba09009c9717c930855baf4cfaba24db90ec6f6004daa619d5c07395
MD5 hash:
b327740d9d0c50712d16aa7aa40f02a8
SHA1 hash:
8c9b9026b31346ffea0c19c5c7d563b48dd27ca2
Malware family:
VIPKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_SmartAssembly
Author:ditekSHen
Description:Detects executables packed with SmartAssembly
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

VIPKeylogger

Executable exe 3014fe96ba09009c9717c930855baf4cfaba24db90ec6f6004daa619d5c07395

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments