General
-
Target
82b9e2a2ba3beb30b1ac58cdea177c9a69aa83c6f6e969c66a12dc4e67bce70e
-
Size
678KB
-
Sample
250115-ccxvgawrft
-
MD5
833fab57389d9754fa187be91522f1e2
-
SHA1
0e3404ca54d0ea2098b6084c4d692e4d31ae9f1a
-
SHA256
82b9e2a2ba3beb30b1ac58cdea177c9a69aa83c6f6e969c66a12dc4e67bce70e
-
SHA512
92923d54fa1960d0e712189287cc6ac48f9fda5a9ff75fe43fc14db33f60fdbbd18c9d09aa27c74fd3b075fd6a9490f070eef9e99daace8d564d4bfe9f53d0ba
-
SSDEEP
12288:AeFmJXRZqQdYesdWhSJmDrqR2Y9n1YZyuHB2RnMDutAJSryUN:Aom0U9g3R2wnhYBwMDutkSOK
Static task
static1
Behavioral task
behavioral1
Sample
RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.vimet.com.vn - Port:
587 - Username:
[email protected] - Password:
auHM5EXeLggV
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.vimet.com.vn - Port:
587 - Username:
[email protected] - Password:
auHM5EXeLggV - Email To:
[email protected]
Targets
-
-
Target
RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET.exe
-
Size
739KB
-
MD5
0651a05d2350a93f9f1ff6400d7db55d
-
SHA1
4548e1d49873626ac6eee581126318b17024feb5
-
SHA256
a5be206861bab4850f3022243ae51161423cc8f8a12aed99f9f55f04a774df73
-
SHA512
9340e004fab5479e90acacfb6260ba9681a6a60f6fd76c230270eeecd6d3f42f0fa9ea33ac82bd36b474b5066cc763d54e10403648149dcecd6e8486a13b1f51
-
SSDEEP
12288:nYRxA4Y5lyA/BxSPCyWqLoPZGDI+ef31hJLYZsMJB2RTMRutAbW5KNhc:YRBLhDM9hJXuBwgRut/5KN
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-