General
-
Target
Justificante pago-09453256434687_1.rar
-
Size
1.0MB
-
Sample
241219-lfw7sayrbj
-
MD5
5c41293b3ea6cdc60cf5d97d4127543a
-
SHA1
b81a9e85573cf66e85a946f3cb839bca7232e885
-
SHA256
702d26b25150324c29c92369b298867f75587321b911b97d6c5998777459fac6
-
SHA512
4ee3979ba49cb542ed908787419001067282d56aa00b9b7c10bef19fda3b7e4ae12b9b80935f9f1e6eb5a9b3d7324d4bc85eed3f17e53adf5ec167add51482bf
-
SSDEEP
24576:nCtwenJZ/0X8zRqE07fRKI3eyvwnVh+Bl76NAYYB3vB7:nCKeJ5VX1vOKTQAFW3vB7
Static task
static1
Behavioral task
behavioral1
Sample
Justificante pago-09453256434687.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Justificante pago-09453256434687.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7884953123:AAF1UbV49cF9gYVrnfCw9g9ZbVXhB325bSM/sendMessage?chat_id=5234817354
Targets
-
-
Target
Justificante pago-09453256434687.exe
-
Size
1.1MB
-
MD5
4252cd5753def4a484fb3313e1029e66
-
SHA1
19fd0734102e1eebe6c7f42d530d30e920366e00
-
SHA256
96b8248be606c47b8955a560f3df160a4c9026ce1956e407daf177f17549e4f7
-
SHA512
471851f39c4d058798bce13f80c63f38e3f3196132c5fe3068982362d7c9c876670cef2f768a8de7ed300669a85c58b367c1b51221617a1d8ae67cda77b82984
-
SSDEEP
24576:3NrNYoKOHCWJSICvcVU2F3VwV5k7j5awX300zQUGtZQ:d+jEWhvsU2F3VwXgj5aEkHUGtZQ
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/nsExec.dll
-
Size
7KB
-
MD5
675c4948e1efc929edcabfe67148eddd
-
SHA1
f5bdd2c4329ed2732ecfe3423c3cc482606eb28e
-
SHA256
1076ca39c449ed1a968021b76ef31f22a5692dfafeea29460e8d970a63c59906
-
SHA512
61737021f86f54279d0a4e35db0d0808e9a55d89784a31d597f2e4b65b7bbeec99aa6c79d65258259130eeda2e5b2820f4f1247777a3010f2dc53e30c612a683
-
SSDEEP
96:J9zdzBzMDByZtr/HDQIUIq9m6v6vBckzu9wSBpLEgvElHlernNQaSGYuH2DQ:JykDr/HA5v6G2IElFernNQZGdHW
Score3/10 -