General
-
Target
C0R99012T83633196.eml
-
Size
205KB
-
Sample
240823-1ms62a1bmq
-
MD5
82c89feeafba2f9d1681198ac3888e3a
-
SHA1
92f40d5d596f7de2579153be44661686cb539a38
-
SHA256
eac9eb05b0d84224119fb275b0e87a79a3df635ff2beff4e18014fb0b48dc512
-
SHA512
1481864a7403891c3fb8ac959fbf4eca0ea1e65f98c8407b33121a354b30673dac2ddd444f31f581e4a5ed37403a3ead6b56602d23f2831a9e7349d6efa5c344
-
SSDEEP
3072:neusqIqgDr9Bgt9u2a5ol9nY+42m52GbVF97H6k2o:nJIqg1Bgt95vHnYlAGbVN
Behavioral task
behavioral1
Sample
FedEx AWB 000263577955.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
FedEx AWB 000263577955.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.ghostfilesuccess.com.ng - Port:
587 - Username:
[email protected] - Password:
binAmen2024$# - Email To:
[email protected]
Targets
-
-
Target
FedEx AWB 000263577955.exe
-
Size
270KB
-
MD5
cfc120bf407819279cf397b82349f981
-
SHA1
02a48aa73c673adb1e0f7853a2134621915c20da
-
SHA256
b8d723a1c3a3fd42eebbf246571cf7704bc34001cf1a7599b0e2838957537140
-
SHA512
c8910a24f0ea386847824994537a8216238abac73ec242a2588d3f93a45681e86626781afa203799d7769b3d791273cca6242267d23510833f6c1a32f2246f72
-
SSDEEP
3072:lRaT7BpxrdPlRH/Pc3ctX9eymsjK5aBlTpHOKpSUYmyG5EMbfPG4s0PUYTVg4i4g:8e3slTsUVyGlbnGGzb
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-