General
-
Target
27102024_1408_18102024_RFQ-KTE-07102024.pdf.z
-
Size
12KB
-
Sample
241027-rfqb5awmfz
-
MD5
7d39771ed7ef496f1b8410acdee4099d
-
SHA1
0baa2cc2f1e1e322d09057c8b092873c028e24dd
-
SHA256
ab160f7ae2bfabef17e26479c88320d6e0dc237328ec3d1586a1f6d9eb234684
-
SHA512
bd1325a50dba9fd5b319d5b8699fa932492ba3d1427699fadc43c23c1e44ac947969beed2905e77d96cb35bfea1b5963f4a7ba734f6c4078452033cd5c26f586
-
SSDEEP
384:jzUalKK1CPIHvae6Txr6r9Vaws5vWMxbSP7mKX44:jzllKMHSe6dG6+MomKH
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-KTE-07102024.pdf.scr
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
RFQ-KTE-07102024.pdf.scr
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7371892501:AAE6c_q-yLsVj82ZZEmMuRlQtTm95MBjCz0/sendMessage?chat_id=6750192797
Targets
-
-
Target
RFQ-KTE-07102024.pdf.scr
-
Size
28KB
-
MD5
4aab71fbea4b35729e6a1de62c3e9c4d
-
SHA1
2b4bc1a883fa32a13b095a6385ca54f2a61a1959
-
SHA256
81902ac66a51c109471bf723cd373ab47a52c992855b9e2dd954090326cac420
-
SHA512
1eadfc55728d115244ada96a7eb4de174afc34333bad63ec72d0e9f478f07c1c536e91319c1b9bcc7ea0e0a09d5130e21acf8ab5ba5b1fbd1f8441649bd2f660
-
SSDEEP
384:UHcq28V683SxRkjkpvPDFBpzg3GBqphxAwRfsSlYoxEcn1k6+IGJl:UV3SxKjOHDZ83GBv2xr1k6+ISl
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-