General
-
Target
30112024_0150_27112024_QNB Ceklerinzin Detaylari_27.11.2024.pdf.rar
-
Size
647KB
-
Sample
241130-b9j47s1khq
-
MD5
0e807d52520644314f5415c2a74ecb14
-
SHA1
2119dccf2c9cd95f615604df59e225f4a24da4b7
-
SHA256
dc7fc96d7baee0681f887dd6221040b056c31a497974b28bca887f265756c52b
-
SHA512
8fd065ca22aee54e018fa1cadb363f1ccc3fd7532285b94d13a367b49a27ef68de7af9418cedb79c30702c7091410e5da950beb18c248cab5131a8bdc62b4e35
-
SSDEEP
12288:jYyIQx8m6N1Juh3nqT3eyyiFASuiY5U8qwvwDPbN6VzqxZmftGXhx6:jYXQy3JuhXuk47d6UFp6VWCtM76
Static task
static1
Behavioral task
behavioral1
Sample
QNB Ceklerinzin Detaylari_27.11.2024.pdf.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
QNB Ceklerinzin Detaylari_27.11.2024.pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
kashmirestore.com - Port:
21 - Username:
[email protected] - Password:
c%P+6,(]YFvP
Extracted
vipkeylogger
Targets
-
-
Target
QNB Ceklerinzin Detaylari_27.11.2024.pdf.exe
-
Size
898KB
-
MD5
fde7d97ee119733387c6b70283efa1f6
-
SHA1
663fa41558dc7e708b37a76c5ab332ae1e9157c3
-
SHA256
ef15ebc6e9565a1e8f05e0dbcc2abdf4e4d5a3adcd88512f8c0148c04ab00ae6
-
SHA512
7c39e30c23cdd9a4c1333f342fc499a7f5172a808804cf0048796cdc7e5fdbb36cbbc2078da71a86f8a812b0280faa64352ae00eb4ca33ee04f0c4ede570c439
-
SSDEEP
12288:1tZ5IpugDDkTsYr6jIEAa3DusmYZyvgzHGToaRHinMP84fpydPWxi9+H:ZdOWuIE73fbyKGToa2484fpy8iM
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-