General
-
Target
OUTSTANDING PAYMENT REQUEST.exe
-
Size
1.2MB
-
Sample
250117-rg7b2a1qfn
-
MD5
78969cbcca783c376160309a00ec4e2a
-
SHA1
851b49ba65b73f98b8ca4d308589d6023817d3a9
-
SHA256
df43f86a6dd300e47ac8d57aeb24bb4037165fcbff954d91379773474e2481f2
-
SHA512
7d0892a5b1967b4c89e3a8a42060b23e63d72dd076a26ffb6944e803fa1fb8373edc4bb589abc64eb8201dbfad07e12abb65e99ec6b270e265de62be504dff02
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCmE+yhEDXCUna4Ja0lkZQ/42NB:7JZoQrbTFZY1iaCmlfyUnVJa0la2P
Static task
static1
Behavioral task
behavioral1
Sample
OUTSTANDING PAYMENT REQUEST.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
OUTSTANDING PAYMENT REQUEST.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
cash@com12345 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
cash@com12345
Targets
-
-
Target
OUTSTANDING PAYMENT REQUEST.exe
-
Size
1.2MB
-
MD5
78969cbcca783c376160309a00ec4e2a
-
SHA1
851b49ba65b73f98b8ca4d308589d6023817d3a9
-
SHA256
df43f86a6dd300e47ac8d57aeb24bb4037165fcbff954d91379773474e2481f2
-
SHA512
7d0892a5b1967b4c89e3a8a42060b23e63d72dd076a26ffb6944e803fa1fb8373edc4bb589abc64eb8201dbfad07e12abb65e99ec6b270e265de62be504dff02
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCmE+yhEDXCUna4Ja0lkZQ/42NB:7JZoQrbTFZY1iaCmlfyUnVJa0la2P
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-