General
-
Target
06012025_1556_06012025_PO#17971.zip
-
Size
706KB
-
Sample
250106-tdk1qszrhy
-
MD5
2cf0b13de93f222df2778ef9ec89eda5
-
SHA1
5afe25a9487f48424f084d060a9a7edfabffcd2d
-
SHA256
0fb8f39aa39be7957d58bf07677b66d0eb333ee1445d093383e1a8bde7e45ecd
-
SHA512
1683ffcc27992dda5b0a8b9926fe1e303a582abefe26bd81f6a8686ae25c17a72d83ae5f98e88a7dca4ef92e6c7b64066f5ccc2d914d7d1effcda459aaf9660b
-
SSDEEP
12288:pIJNlfm4OMjYHnjUlpLG2VxAvqoGbUeioVnmbpSJp:pINlfm4LjuUlpLG2oVanG8Jp
Static task
static1
Behavioral task
behavioral1
Sample
PO#17971.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PO#17971.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
wVCMFq@2wVCMFq@2
Extracted
vipkeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
wVCMFq@2wVCMFq@2 - Email To:
[email protected]
Targets
-
-
Target
PO#17971.exe
-
Size
808KB
-
MD5
a8a2543b3b684c7668e2ea7f0fda818b
-
SHA1
95f1ef47f4fddae43d5f2923be0498ac20d39ed7
-
SHA256
1a096b05c22c2f1fe36e1a03e28b49129d1d5812c5b974c929b2213c8dc8896b
-
SHA512
e47b2426d4359e43d32bfbe87fddcab42d80becc73c117f2b09ce59169ebd641eea13491fcf9b9ce0cfc19e8e7377c96bf925e034680d4dac1257b8a2b285048
-
SSDEEP
12288:YUoV+I4MVKW3U5Hn4GMtYvvjUNn9KKXLgvaGG5IeiSl3vu/SJuJ:ERgQU5H4Dt6UNn9KKYve3m/SY
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-