General
-
Target
お見積依頼、_20241113.zip
-
Size
644KB
-
Sample
241113-d6k87swcrp
-
MD5
de7ceb98941e9d9ceccfdd2b545af8f8
-
SHA1
aab112c670d46de2ababb1e631336564d97744e2
-
SHA256
a0cff2406a1b0101909f589dcdd5c6cce94e211373d0cea45209bbff1afea50b
-
SHA512
70878c66d39e6119aeb878d9ece7d89f112190dca29f30fd3888f2c1c415a4182ce5ebe4de25124b64550dff4befaadfad71f528ae5a52eef38cb10730a5fe07
-
SSDEEP
12288:aR9ay9NOYlJdam9R3FqcovO/V0kVQ7kG3x7T+JmjUtw1m+IY2R:a6EtJd9X8KV0IQ753x/+ofItLR
Static task
static1
Behavioral task
behavioral1
Sample
お見積依頼、_20241113.exe
Resource
win7-20240903-ja
Behavioral task
behavioral2
Sample
お見積依頼、_20241113.exe
Resource
win10v2004-20241007-ja
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.hgdijitalbaski.com - Port:
587 - Username:
[email protected] - Password:
05310325799habil - Email To:
[email protected]
Targets
-
-
Target
お見積依頼、_20241113.exe
-
Size
701KB
-
MD5
77cf9c286b05a5afaca2de336ba1f075
-
SHA1
bc95b5df0602b53675429f06a9f1e367b65e1b86
-
SHA256
39adb205bc13aa9d2e6e2531da9c7955e46f5e27fceae045a8c040971e702ec0
-
SHA512
e42e9dd3c26926354cabaed656042db7d3294f90a942ce5c33ea16d11f0b2e078489c5e9d9ab33a25266eec1f0b5df3bf80764dcbd17ebe91775b5622fb846db
-
SSDEEP
12288:JMyCotxqmA3F+mGDTLXRNFovOLV0kzO7ka3x7TCJmxa564nv+Z1chLX/3R:JMyBqmubWTLho0V0EO7D3x/CIp82Z1c/
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2