General
-
Target
New Order_Purchase_202401017.exe
-
Size
789KB
-
Sample
241017-qmz98ssepm
-
MD5
48ba025a37787edc3a221155a135018f
-
SHA1
91ff3bb3bfe316d4c7811ca899bc47323210c266
-
SHA256
d41fe3fc605a799e6f95c52cc16d35a2f1bc03fd166187a1c6fd830f287e3518
-
SHA512
99c0be7ef941a2cc1a20e217d295b7915dfe435f6a97644d23810e3056922c08936641398bcea45401ceb5559441df8c5b1ef45417f5b466a425caf6bcedf7a2
-
SSDEEP
24576:WJcu+7e6zsGEDFZeKtjfib4t/uPkSgNopI61RWBY:WX+gGQeKtji8BusfopIcWK
Static task
static1
Behavioral task
behavioral1
Sample
New Order_Purchase_202401017.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New Order_Purchase_202401017.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.tmars.net - Port:
587 - Username:
[email protected] - Password:
More@123456789 - Email To:
[email protected]
Targets
-
-
Target
New Order_Purchase_202401017.exe
-
Size
789KB
-
MD5
48ba025a37787edc3a221155a135018f
-
SHA1
91ff3bb3bfe316d4c7811ca899bc47323210c266
-
SHA256
d41fe3fc605a799e6f95c52cc16d35a2f1bc03fd166187a1c6fd830f287e3518
-
SHA512
99c0be7ef941a2cc1a20e217d295b7915dfe435f6a97644d23810e3056922c08936641398bcea45401ceb5559441df8c5b1ef45417f5b466a425caf6bcedf7a2
-
SSDEEP
24576:WJcu+7e6zsGEDFZeKtjfib4t/uPkSgNopI61RWBY:WX+gGQeKtji8BusfopIcWK
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-