General
-
Target
GPL - INQUIRY-HQ242654pdf.z
-
Size
852KB
-
Sample
250120-sb9qmsvlgv
-
MD5
bc9f48616a3f774e5493b9a243dc21d0
-
SHA1
6e9357b14ff8a529c9d341fab5c2cdc2cee9a0d3
-
SHA256
e5caace732655e9f48d62e03b47753f12b03bae97fc470b1359af944bdb54e73
-
SHA512
5deb9c1e14421b41043c452c254a23ac2362312f063a0da726d48be1fad488d8765867175d9efa966ed19707171cfd5d4be6ae4688217bb0eb0959653b034b83
-
SSDEEP
24576:JCF7mqzMjzEOZQbSf1wiagUaWLb4Gdxufdzf7NpLGtBLqLTV:q7mqzMLLafNdxQdzzrLGzG
Behavioral task
behavioral1
Sample
GPL - INQUIRY-HQ242654.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
GPL - INQUIRY-HQ242654.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.vvtrade.vn - Port:
587 - Username:
[email protected] - Password:
qVyP6qyv6MQCmZJBRs4t - Email To:
[email protected]
https://api.telegram.org/bot7323823089:AAFBRsTW94zIpSoDS8yfGsotlQLqF2I6TU0/sendMessage?chat_id=5013849544
Extracted
Protocol: smtp- Host:
mail.vvtrade.vn - Port:
587 - Username:
[email protected] - Password:
qVyP6qyv6MQCmZJBRs4t
Targets
-
-
Target
GPL - INQUIRY-HQ242654.exe
-
Size
937KB
-
MD5
bc7baa033dff24e20cf7180039f730f1
-
SHA1
e63aa08c5ff536cc60859e76223405a83d15af25
-
SHA256
ff8b7e1dd30b48c8c2144509dbf84b3103160a4fd8dcdb4341a782eb60592f0e
-
SHA512
88a9768b65c0d6b7af3f29c4e8b2326ad38f1866445e11ccf7d9deeb97669e3514519226c881e07aaf6f335f4ad4de462a1f3a3e56446fa659e1ec3700e75715
-
SSDEEP
24576:0thEVaPqLqn8vgIiregw+cVizAKDupFZZoJSyIU8is:IEVUcXVfPVWSxnis
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-