General
-
Target
SOLICITUD URGENTE RFQ-05567.exe
-
Size
1.2MB
-
Sample
241025-rnfsna1brf
-
MD5
9012193edf2bb4babb0cac26a33cf304
-
SHA1
febd1e9f58df8d366b61ad3c1895e8d76fdff736
-
SHA256
6545bbb96495a8772c5f6d6c5e0c202e05153002d37b7d27580216b4605c67f7
-
SHA512
69f3124501e3978f54807bd28e5fe4eb456b61735aee90ba76fca3355037a54941cf321ab398c519ed65937969433df8e41541be78cb454c825140c2746c3cef
-
SSDEEP
24576:tfmMv6Ckr7Mny5QZl29nU3jQiFSG69xNxG1j552NZ:t3v+7/5QZl2RUsiFyxbZ
Static task
static1
Behavioral task
behavioral1
Sample
SOLICITUD URGENTE RFQ-05567.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SOLICITUD URGENTE RFQ-05567.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.singhalenterprise.com - Port:
587 - Username:
[email protected] - Password:
balkishan@123
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.singhalenterprise.com - Port:
587 - Username:
[email protected] - Password:
balkishan@123 - Email To:
[email protected]
Targets
-
-
Target
SOLICITUD URGENTE RFQ-05567.exe
-
Size
1.2MB
-
MD5
9012193edf2bb4babb0cac26a33cf304
-
SHA1
febd1e9f58df8d366b61ad3c1895e8d76fdff736
-
SHA256
6545bbb96495a8772c5f6d6c5e0c202e05153002d37b7d27580216b4605c67f7
-
SHA512
69f3124501e3978f54807bd28e5fe4eb456b61735aee90ba76fca3355037a54941cf321ab398c519ed65937969433df8e41541be78cb454c825140c2746c3cef
-
SSDEEP
24576:tfmMv6Ckr7Mny5QZl29nU3jQiFSG69xNxG1j552NZ:t3v+7/5QZl2RUsiFyxbZ
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-