General
-
Target
Order.zip
-
Size
477KB
-
Sample
240921-nxv26azhng
-
MD5
2d98061820e074b3c289815996a38443
-
SHA1
f6ce537a7f31ed9509d2b22f2406cb01f227a69a
-
SHA256
e4d8394f74053ae9e12309994170e177ec8bd01e756d6b327d88efee7d3bf924
-
SHA512
1ce0f58cd35508f78646e282a4257457602dc6c454ab0ab3ce374854263fff94d1f3da849e6ecad3dfdd6807d7cecb832e8030f785184b3dc0b767cef461ba39
-
SSDEEP
12288:gekIy66nl89Os8Tr6nD/RtqygtWeZ+NTaTe2:g4ilyUrO/jqyYIeTj
Static task
static1
Behavioral task
behavioral1
Sample
Order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Order.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7985888771:AAEHZkJS7VPCqlc0_wV-hgnkJ-IvnEmNisQ/sendMessage?chat_id=2135869667
Targets
-
-
Target
Order.exe
-
Size
888KB
-
MD5
d6967ea7baf752e952a2c8c184feef3b
-
SHA1
fb9f42d5792c1e3de2655e170c45ed480aacb3e3
-
SHA256
e40aa2ac74b12d2b000617839127a60a5faa81d7cae5087b738ba2b45c040537
-
SHA512
ddaeae2bbe990c89713b7a1b5b272b75f010b3106f88fc64b81b94d520811567c70d91c1d02e8f5b7383eded48a6c928a213afb62ed414c47395903c0942edfe
-
SSDEEP
12288:TvSqYOE58ExJ78cdJZDO14zXVwmaHLXV2xNgC8BtnpHKWULHaesE1gqd1tw/:O6OCcdJZDO14zXVwmaH7IxABTXedFy
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-