General
-
Target
RFQ DO NO17665.exe
-
Size
751KB
-
Sample
240907-s9xhza1enp
-
MD5
ec30649f75893731006dff3ea5620320
-
SHA1
30d70f3e5b8a2136765ba2e3e330c2b2d0a73ac3
-
SHA256
0610f4eaa31b99c543cfe5c6036db65ff93b62f55e8309251db74e0d3efb087f
-
SHA512
3c6c1138f138f374602290a3f40c7f7412c44ca5a9b301ec535c720b1b0b87d3b2e16ffe5e2986c60ccbc844a4f857a6e8839f3b7d24ac20ca2e12e1ba94c3f8
-
SSDEEP
12288:haPjRWed/Y133A28bV0+hEQefS73XN2pMhRZBHtBhoPFhDRn0q:h6Bq33ypEJfS8pMh9HtBePln
Static task
static1
Behavioral task
behavioral1
Sample
RFQ DO NO17665.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
RFQ DO NO17665.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7443984555:AAHQ-E3DZtiV1VJfuJbVaFYZMfeJ58spqaE/sendMessage?chat_id=6593768982
Targets
-
-
Target
RFQ DO NO17665.exe
-
Size
751KB
-
MD5
ec30649f75893731006dff3ea5620320
-
SHA1
30d70f3e5b8a2136765ba2e3e330c2b2d0a73ac3
-
SHA256
0610f4eaa31b99c543cfe5c6036db65ff93b62f55e8309251db74e0d3efb087f
-
SHA512
3c6c1138f138f374602290a3f40c7f7412c44ca5a9b301ec535c720b1b0b87d3b2e16ffe5e2986c60ccbc844a4f857a6e8839f3b7d24ac20ca2e12e1ba94c3f8
-
SSDEEP
12288:haPjRWed/Y133A28bV0+hEQefS73XN2pMhRZBHtBhoPFhDRn0q:h6Bq33ypEJfS8pMh9HtBePln
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-