MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 af724ba9b889c902ae248039a93b86d53613dc966e648e4fe54ca2b10d0ea712. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
VIPKeylogger
Vendor detections: 14
| SHA256 hash: | af724ba9b889c902ae248039a93b86d53613dc966e648e4fe54ca2b10d0ea712 |
|---|---|
| SHA3-384 hash: | f4b700fd7f6bcd217e91fd91b47671f15f9fba072dd4291c9c44f96ae45efa55e4999994231ea022357c20c33cfd9dac |
| SHA1 hash: | 630a6b17d1e4d2b4cddb0cb12d7ffd4ee6855b53 |
| MD5 hash: | cbfeb2ac1cc37bbc45105aff897d5fba |
| humanhash: | sierra-west-one-aspen |
| File name: | dump.dll |
| Download: | download sample |
| Signature | VIPKeylogger |
| File size: | 294'912 bytes |
| First seen: | 2025-02-13 11:55:52 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | dae02f32a21e03ce65412f6e56942daa (123 x YellowCockatoo, 60 x CobaltStrike, 44 x JanelaRAT) |
| ssdeep | 6144:8wOisRx5VPVaSEeGogs0sU2giY44e2kV2NpHPLVpQ2Ts9B3RboUZub:9OisRx5VPVaSEeGogs0sU2giY44e2kVi |
| TLSH | T10B54A62D2FD8EC00F7BF453792B95024C676B05305748E2E1AE2E4252E7EA05AE46FD7 |
| TrID | 68.6% (.DLL) Generic .NET DLL/Assembly (236632/4/32) 21.2% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 3.0% (.EXE) Win64 Executable (generic) (10522/11/4) 1.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 1.4% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| Magika | pebin |
| Reporter | |
| Tags: | dll RedLineStealer VIPKeylogger |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0
739a86b464bb1710cc2a5cb2b5eee3596a548c962c0f7cc1a8df9b1d0a5bde07
420f888c8bc5a5e5c71b6c157e7a8ed83527bb4893605f7c827cccd89f286cbc
af724ba9b889c902ae248039a93b86d53613dc966e648e4fe54ca2b10d0ea712
f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0
739a86b464bb1710cc2a5cb2b5eee3596a548c962c0f7cc1a8df9b1d0a5bde07
420f888c8bc5a5e5c71b6c157e7a8ed83527bb4893605f7c827cccd89f286cbc
af724ba9b889c902ae248039a93b86d53613dc966e648e4fe54ca2b10d0ea712
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | Disable_Defender |
|---|---|
| Author: | iam-py-test |
| Description: | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
| Rule name: | extracted_at_0x44b |
|---|---|
| Author: | cb |
| Description: | sample - file extracted_at_0x44b.exe |
| Reference: | Internal Research |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defender features |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.