General
-
Target
7dce1195115612ac6263cf59dbc32c2f43dd253302e1b50eb3d4ff5a81a739ba.uue
-
Size
744KB
-
Sample
241026-chj6kaygrl
-
MD5
96991e9c7ff8192ec7246506df3950a8
-
SHA1
4d5aecf6fece78360f06a4304b4fe146f1e26a1c
-
SHA256
7dce1195115612ac6263cf59dbc32c2f43dd253302e1b50eb3d4ff5a81a739ba
-
SHA512
fd9288cf17e939b4a06ed9fcfd4cf41028aa94ed3a2821c5dc1281cd4027251678f33ed82560345484bd5f32c8f63a45144293d13def8cddb84bd47e411e1481
-
SSDEEP
12288:b+N2cR0kzaNOCSGBzax7ESGaRu0OQY6jZsG6IV8rvw3L3fHF+l7lXuZpewcwd+cN:VcKyIaxgSGaRu05tKlMLvFa7lupqwd+i
Static task
static1
Behavioral task
behavioral1
Sample
Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.fr - Port:
587 - Username:
[email protected] - Password:
Jc.2o3o@ - Email To:
[email protected]
Targets
-
-
Target
Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe
-
Size
821KB
-
MD5
d8daeb11e006370f3b454df74c382ced
-
SHA1
3351af8f5627d4df174d4c659391a40d9563ca37
-
SHA256
7b57e6494bb05f09e8a09a69b3c9f28239fe18cb469d223826c95bee2d650197
-
SHA512
d57fe6e72acbbb577c9b4dd36a53367a4d0cadfde7e32c036caa7adffd01ae021baa8e2beff7bbf06fb3927c0b74f84725f0714d05b7ed1e81e1f5a5b258fb86
-
SSDEEP
12288:zbedZeA56A4KUwU2dEa4oDr2rxR5NiYrDkhNSOG6BgKBizbNEW0JTWxH+odSheub:75wUWEa4iU8wDINnenL/5twheu35wq
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2