General
-
Target
PAYMENT INFO.exe
-
Size
774KB
-
Sample
240822-m3dvdswdjp
-
MD5
6dccb1dd8e7b7fe9d9f138caaea7f420
-
SHA1
038fec3f89b09fad5e74dc978b00635f39da3bd0
-
SHA256
36072f64891875212e9f45cc11d64d1bfdbe9a8caa55cdb1f488d7ac1c232074
-
SHA512
01e81b6609ebacf1234ec22206c03b67dd7e0e318ab27f6dbb84bdf0ccf6514e45563145fc6b893e041af42dcc167e9caaf388d34d5a5ded7f6cb7062db173b3
-
SSDEEP
12288:dVf55k2851Elq/61UJp2Xen07Ow4BuYwOcFB7YTcYeQ8dRrrllE3Oix4r:J5x5lUJgXk07x4tiUcBFHrFEi
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT INFO.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PAYMENT INFO.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7470097193:AAH7g9zj8FQx12YOFkn9mZO_1-BTN4b6gKo/sendMessage?chat_id=6155920142
Targets
-
-
Target
PAYMENT INFO.exe
-
Size
774KB
-
MD5
6dccb1dd8e7b7fe9d9f138caaea7f420
-
SHA1
038fec3f89b09fad5e74dc978b00635f39da3bd0
-
SHA256
36072f64891875212e9f45cc11d64d1bfdbe9a8caa55cdb1f488d7ac1c232074
-
SHA512
01e81b6609ebacf1234ec22206c03b67dd7e0e318ab27f6dbb84bdf0ccf6514e45563145fc6b893e041af42dcc167e9caaf388d34d5a5ded7f6cb7062db173b3
-
SSDEEP
12288:dVf55k2851Elq/61UJp2Xen07Ow4BuYwOcFB7YTcYeQ8dRrrllE3Oix4r:J5x5lUJgXk07x4tiUcBFHrFEi
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-