MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 67c01a468b92e5f7801dcaf9705430e64fd04fd4c14a63f6b83e68d239ac3d06. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
VIPKeylogger
Vendor detections: 18
| SHA256 hash: | 67c01a468b92e5f7801dcaf9705430e64fd04fd4c14a63f6b83e68d239ac3d06 |
|---|---|
| SHA3-384 hash: | 43150caf445a9dbb80943ec30c8357c692d4781eda614a079568e7c9594269973fb1cebde56c7317e66cb8540d6f282b |
| SHA1 hash: | af7e4d4f099966d88c2324a4a1fc5a97243800f3 |
| MD5 hash: | 366d276284523f7fe4cfcad8838ab637 |
| humanhash: | virginia-helium-bravo-montana |
| File name: | UCN2381 QI MING STAR.exe |
| Download: | download sample |
| Signature | VIPKeylogger |
| File size: | 712'704 bytes |
| First seen: | 2025-09-18 00:35:36 UTC |
| Last seen: | 2025-10-09 14:01:39 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:2RZOx7untvfhIPQvZHAYOlPg8Y4Iu4i+qwEswEjg74ju2jtNdtHZO4qGSsYet7W+:2RZw7wpfyIvZH+Zg9LqwEcg7dkDdtH4K |
| Threatray | 3'229 similar samples on MalwareBazaar |
| TLSH | T114E40158234AEE12D5A21BF00870E7B4133CAE99B911C30B5FFABCDF783676515582A7 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe VIPKeylogger |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.