General
-
Target
OZEKESSEVEN.20.01.2025.pdf.exe
-
Size
815KB
-
Sample
250120-qvn7ya1qdr
-
MD5
97a247124adb2f06a055989511504ae4
-
SHA1
2682dcaa02f20fd62daf71d8e93249ab9cab2d05
-
SHA256
fea0db3026f3e075b240d97b0ff93ac157c8dc69a7d56a32e3595ed261a9ea55
-
SHA512
106769f08c0bbfb1dad521c9fc87842532235aba8b01893f51832590cf2082ab0c3954f9122880e13c6658ab5ad1f29da259a81223588e401f0828f12fe4691d
-
SSDEEP
12288:X5y6WhRSUuncKBvu9vM0y/VLj5iyce8rhdyIu+FGLRxdqAdaXwjV:w6NncQu9+DcfhdFQxcA4K
Static task
static1
Behavioral task
behavioral1
Sample
OZEKESSEVEN.20.01.2025.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
OZEKESSEVEN.20.01.2025.pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
kashmirestore.com - Port:
21 - Username:
[email protected] - Password:
c%P+6,(]YFvP
Extracted
vipkeylogger
Targets
-
-
Target
OZEKESSEVEN.20.01.2025.pdf.exe
-
Size
815KB
-
MD5
97a247124adb2f06a055989511504ae4
-
SHA1
2682dcaa02f20fd62daf71d8e93249ab9cab2d05
-
SHA256
fea0db3026f3e075b240d97b0ff93ac157c8dc69a7d56a32e3595ed261a9ea55
-
SHA512
106769f08c0bbfb1dad521c9fc87842532235aba8b01893f51832590cf2082ab0c3954f9122880e13c6658ab5ad1f29da259a81223588e401f0828f12fe4691d
-
SSDEEP
12288:X5y6WhRSUuncKBvu9vM0y/VLj5iyce8rhdyIu+FGLRxdqAdaXwjV:w6NncQu9+DcfhdFQxcA4K
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2