General
-
Target
c601b7278ae5a7b4f09e71209054c91aa77e5b11484f970fe5227715463df152
-
Size
721KB
-
Sample
241125-jyepcaxjgv
-
MD5
bec851de65c0c36b96841f5ed3363536
-
SHA1
e00dd64ec4c1810396303e8288240f1e7fa6d7a0
-
SHA256
c601b7278ae5a7b4f09e71209054c91aa77e5b11484f970fe5227715463df152
-
SHA512
7fecb816ea7df1ffa14452835c1c890c2715f42504a85d172250a328470fe534a9a57c32cec9c1bf025b9c4e8dd2893f675fd02dc1ea9a31f3a6055296f82599
-
SSDEEP
12288:oWfpQ7suwPO/AxRJ4dFkc+KnhnweBEyX/cde6gHhAnbRKQ3XHvK:/Q7suwWIJ8rhnwwd/cde6gikQXPK
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY_pdf.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
INQUIRY_pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
jhxkgroup.online - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@ - Email To:
[email protected]
Targets
-
-
Target
INQUIRY_pdf.exe
-
Size
749KB
-
MD5
3885966389f63ca00a45ff5aa413ec37
-
SHA1
b154cc76e443fa9b3f697a430c95146e5d7261f3
-
SHA256
0c8cf2991746319e1f1782ad0677c671abc6c3b53129fcbafd93ede7e60c4a8b
-
SHA512
330b6f2f09ae9600134e4280f1a7b9f92ddc44b6fcb107bb42285eb810cb408a05b6c5f6b113991a6d365d37757caacf6f0315a3f75a1a6092d24fcb0501dfb9
-
SSDEEP
12288:kbeXO/k6POZAJZhwDFkc+shhna2BE6tRcbi+gwrHBAnfBKPtM:KeXGk6WShoxhnaIRRc++guCAV
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2