MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c1ac4217e48ba5dcd89a543db47563a12b7e402193145d7d71ae7b3351cad47b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



VIPKeylogger


Vendor detections: 14


Intelligence 14 IOCs YARA 6 File information Comments

SHA256 hash: c1ac4217e48ba5dcd89a543db47563a12b7e402193145d7d71ae7b3351cad47b
SHA3-384 hash: bbc281127d3c241bef944dc97b6fadd9bf887f976685c2dffb3624286456d9b7a0d5377a201b91f7f33fd8e3452e99a4
SHA1 hash: add245949a80add21f61e19823505898bec17845
MD5 hash: 682fe3045bb9db9c8918ba5991d08dee
humanhash: cup-cola-moon-oklahoma
File name:Enquiry for AGPEN251112-PO#HG90299.bat
Download: download sample
Signature VIPKeylogger
File size:326'518 bytes
First seen:2026-02-05 08:21:43 UTC
Last seen:2026-02-05 11:52:46 UTC
File type:Batch (bat) bat
MIME type:text/x-msdos-batch
ssdeep 6144:WgsyHyE29EAenbYP+ByZLrUp0ooQOSCfROIlXznfLKAqQrcH:WZe2qnb8+ByZLrusQ7CfROIJ2Aq4e
Threatray 2'612 similar samples on MalwareBazaar
TLSH T1DB6402159E847F69CFBC5A18E0FE260E93F00B4E5856658A9B33BD0A9FF764442071DC
Magika batch
Reporter lowmal3
Tags:bat VIPKeylogger

Intelligence


File Origin
# of uploads :
2
# of downloads :
50
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
_c1ac4217e48ba5dcd89a543db47563a12b7e402193145d7d71ae7b3351cad47b.txt
Verdict:
No threats detected
Analysis date:
2026-02-05 08:27:28 UTC
Tags:
susp-powershell api-base64

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect emotet spam
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm obfuscated
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-02-04T06:08:00Z UTC
Last seen:
2026-02-05T05:57:00Z UTC
Hits:
~10000
Detections:
Trojan-PSW.Win32.Stealer.sb Trojan.Win32.Shellcode.sb PDM:Trojan.Win32.Generic Backdoor.Win32.Androm Trojan-PSW.Win32.Stelega.sb Trojan-PSW.Win32.Agent.sb Trojan-PSW.SnakeLogger.HTTP.C&C Trojan-Dropper.Win32.Injector.sb Trojan.Win32.Agent.sb HEUR:Trojan-PSW.BAT.Stealer.gen
Result
Threat name:
DonutLoader
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Bypasses PowerShell execution policy
Compiles code for process injection (via .Net compiler)
Creates a thread in another existing process (thread injection)
Encrypted powershell cmdline option found
Found suspicious powershell code related to unpacking or dynamic code loading
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Unusual module load detection (module proxying)
Uses cmd line tools excessively to alter registry or file data
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected DonutLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1863783 Sample: Enquiry for AGPEN251112-PO#... Startdate: 05/02/2026 Architecture: WINDOWS Score: 100 76 reallyfreegeoip.org 2->76 78 api.telegram.org 2->78 80 3 other IPs or domains 2->80 104 Suricata IDS alerts for network traffic 2->104 106 Malicious sample detected (through community Yara rule) 2->106 108 Multi AV Scanner detection for submitted file 2->108 114 9 other signatures 2->114 10 cmd.exe 1 2->10         started        13 cmd.exe 1 2->13         started        15 cmd.exe 2->15         started        signatures3 110 Tries to detect the country of the analysis system (by using the IP) 76->110 112 Uses the Telegram API (likely for C&C communication) 78->112 process4 signatures5 124 Suspicious powershell command line found 10->124 126 Uses cmd line tools excessively to alter registry or file data 10->126 128 Encrypted powershell cmdline option found 10->128 130 Bypasses PowerShell execution policy 10->130 17 cmd.exe 4 10->17         started        21 conhost.exe 10->21         started        23 cmd.exe 1 13->23         started        25 conhost.exe 13->25         started        27 cmd.exe 15->27         started        29 conhost.exe 15->29         started        process6 file7 64 C:\Users\user\AppData\Roaming\...\CREDIT.cmd, DOS 17->64 dropped 98 Suspicious powershell command line found 17->98 100 Uses cmd line tools excessively to alter registry or file data 17->100 102 Encrypted powershell cmdline option found 17->102 31 powershell.exe 30 17->31         started        35 powershell.exe 16 17->35         started        37 conhost.exe 17->37         started        45 2 other processes 17->45 39 powershell.exe 14 23->39         started        41 conhost.exe 23->41         started        47 2 other processes 23->47 43 conhost.exe 27->43         started        49 3 other processes 27->49 signatures8 process9 file10 70 C:\Users\user\AppData\Local\...\zrgp3vwt.0.cs, C++ 31->70 dropped 72 C:\Users\user\AppData\...\lrprkjwq.cmdline, Unicode 31->72 dropped 88 Injects code into the Windows Explorer (explorer.exe) 31->88 90 Writes to foreign memory regions 31->90 92 Creates a thread in another existing process (thread injection) 31->92 51 explorer.exe 55 15 31->51 injected 55 csc.exe 3 31->55         started        58 csc.exe 3 31->58         started        74 C:\Users\user\AppData\Local\Temp\Vary.ps1, Unicode 35->74 dropped 94 Found suspicious powershell code related to unpacking or dynamic code loading 35->94 96 Compiles code for process injection (via .Net compiler) 35->96 signatures11 process12 dnsIp13 82 checkip.dyndns.com 132.226.247.73, 49698, 49700, 49702 UTMEMUS United States 51->82 84 api.telegram.org 149.154.166.110, 443, 49714 TELEGRAMRU United Kingdom 51->84 86 2 other IPs or domains 51->86 116 System process connects to network (likely due to code injection or exploit) 51->116 118 Tries to steal Mail credentials (via file / registry access) 51->118 120 Tries to harvest and steal browser information (history, passwords, etc) 51->120 122 Unusual module load detection (module proxying) 51->122 66 C:\Users\user\AppData\Local\...\zrgp3vwt.dll, PE32 55->66 dropped 60 cvtres.exe 1 55->60         started        68 C:\Users\user\AppData\Local\...\lrprkjwq.dll, PE32 58->68 dropped 62 cvtres.exe 1 58->62         started        file14 signatures15 process16
Threat name:
Script-BAT.Trojan.Runner
Status:
Malicious
First seen:
2026-02-04 13:52:19 UTC
File Type:
Text (Batch)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
vipkeylogger
Score:
  10/10
Tags:
family:donutloader family:vipkeylogger collection defense_evasion discovery execution keylogger loader persistence stealer
Behaviour
Suspicious use of WriteProcessMemory
Views/modifies file attributes
outlook_office_path
outlook_win_path
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Browser Information Discovery
Accesses Microsoft Outlook profiles
Adds Run key to start application
Looks up external IP address via web service
Command and Scripting Interpreter: PowerShell
Detects DonutLoader
DonutLoader
Donutloader family
VIPKeylogger
Vipkeylogger family
Malware family:
VIPKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Base64_Encoded_Powershell_Directives
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:PowerShell_Susp_Parameter_Combo_RID336F
Author:Florian Roth
Description:Detects PowerShell invocation with suspicious parameters
Reference:https://goo.gl/uAic1X
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:WIN_FileFix_Detection
Author:dogsafetyforeverone
Description:Detects FileFix social engineering technique that launches chained PowerShell and PHP commands from file explorer typed paths
Reference:FileFix social engineering with PowerShell and PHP commands

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

VIPKeylogger

Batch (bat) bat c1ac4217e48ba5dcd89a543db47563a12b7e402193145d7d71ae7b3351cad47b

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments