General
-
Target
c9001a43df46f44fdef07abfb9516e9dc9d4d699531da09678cad9c05ad82c0b
-
Size
733KB
-
Sample
250120-jvj5nazleq
-
MD5
33af3c304835fdebac80e3370aefd472
-
SHA1
682c0cc0b41f7c3091bccc6026fc7f02ee2cac28
-
SHA256
c9001a43df46f44fdef07abfb9516e9dc9d4d699531da09678cad9c05ad82c0b
-
SHA512
9d9ade489d8a5ed0f7a36ed77260d083a2cd8985a4353b0f14c30e2ce3e4a5a3538582d4e145b585310363a713ed97b0df859239fec2ee9ea3613a2eeb71948b
-
SSDEEP
12288:mi6B/s/3iOcNQsE8EkvpKfvMLt2IyG2i74Z91iwelnr/LhZa2P+bgk7s4VLsRd:ORacxXvMfvVIyrig85r/Lu2GxFs3
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NEW ORDER.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Lobomuffin1427 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Lobomuffin1427
Targets
-
-
Target
NEW ORDER.exe
-
Size
770KB
-
MD5
bd71f06c03ed0d0f5a61876cf9b563b6
-
SHA1
ae0635a19551bb6fdcc9392df5975d7f9dc96481
-
SHA256
297a78a9aa5b7cd880acc2afe115ebf171691b085ee93ff91f85b6b8ce89dcb0
-
SHA512
fdc48441ca1dde89306309ca08fb0499306dc5ad1c317a2a1cdbce70fefacfd210a2252d94070af36c433ff14efd9d1363dabe8d8347607b8cb8ac67dde324e5
-
SSDEEP
12288:AEdOloGWvaVTsnUbx/gSg7NuoCppNuUo+4XJx5Wg67GD6yXWFgMpiwAe9Ojt7JCx:ZmF1WUfg7NvMpNabXJYvC9a8jHZnw
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-