General
-
Target
24092024_1249_23092024_PAYMENT COPY ADVICE [1015453827] Second Party Ref[200004494924] Second Party ID[2000044949] PDF.zip
-
Size
691KB
-
Sample
240924-p2kmnavgrq
-
MD5
88a31e129682f5f51615e3eda71df707
-
SHA1
58c9b8e134b47766149fb161b634eeed7db9eefb
-
SHA256
314844c9429639d5e1148cf5192e837e4b4483068e294573612c8925da965657
-
SHA512
4ae1ea12a6622aa0d52c9cc962a8a684846791d41156994a927d50cd585063be293188a3e3514af8178e69c065c39a20314d5ca7f9b9a012902cde0233693c8e
-
SSDEEP
12288:s/pmtX2nOUouJ2x3d8YfhJy6a1hBzk2H1ilUBKS3MdpmE/scdiVQeoJ0M:AwN/B3d8ahJyz1hxqSapmIsjV+V
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT COPY ADVICE [1015453827] Second Party Ref[200004494924] Second Party ID[2000044949] PDF.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PAYMENT COPY ADVICE [1015453827] Second Party Ref[200004494924] Second Party ID[2000044949] PDF.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7453999531:AAHcCXOdvbDJaILEpGPNgNPm4mcYsRwgAYI/sendMessage?chat_id=6200738063
Targets
-
-
Target
PAYMENT COPY ADVICE [1015453827] Second Party Ref[200004494924] Second Party ID[2000044949] PDF.exe
-
Size
1.2MB
-
MD5
c70b9019ad3bef9b820d658aa8cde813
-
SHA1
3863990d0e827fa3487ae4a5aab5c7162b7565f3
-
SHA256
c2785c5668377424e7d8382d5f16de0d07eda9c394f23bf6c698b4627925c154
-
SHA512
1e3d180d7ba5a8f9e0a47b2d3ed81d28b9d773120171ee0b22d49b055c2307dddf279080f474a28ffd889084afc7270be873d1f52c235068f0253f1a0330d62e
-
SSDEEP
24576:GAHnh+eWsN3skA4RV1Hom2KXMmHav571Umq1sNso5:hh+ZkldoPK8YahhZq29
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Drops startup file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-