General
-
Target
23012025_1002_23012025_New Order list.pdf.z
-
Size
847KB
-
Sample
250123-l21gbswpdm
-
MD5
7a24318082a5383731ff06679e3d7828
-
SHA1
2214e865d093f6276ce343cae8bd837792fb416b
-
SHA256
6ec2ccf980b1e357ff6db2afd3ab101d53fec45af702b48d5615e35c71afdbcc
-
SHA512
c1f3e062f9db86cfba5993abaa840b88ffceb799e9732c017f32ee6390ef4bc09018d3556bc0758fe880c962a0e0c51c0ae4da1d3fdedabcf4f761a524efab3e
-
SSDEEP
12288:CsNx+QKbK8kIyYCedTnjjzjYJ0tL+R/zBd7bTLBeVFJSJBvVLSWZbpPQayFC8L:CU+Q7KyXetVpaV5L38WpRtyIu
Static task
static1
Behavioral task
behavioral1
Sample
New Order list.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New Order list.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
cash@com12345 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
cash@com12345
Targets
-
-
Target
New Order list.exe
-
Size
1.2MB
-
MD5
7d0c3e8ad0c9e73d5fb027a6ab1fd8e3
-
SHA1
2fcc79b1030844814dde5d595f5b1aee2ed2455d
-
SHA256
d67780a7f2fc2ded85c2ccdffdac398e9dac01759260536d61ef40744505ca91
-
SHA512
e3a77e3fc6f9bacfb028ca56e62534de79cc0cc69709d5a8e36bb4d918881d59a2e478a1a21039c1a6f6a924be668c500bd5955869237628246a4802432d9885
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCR3wuPqiUQ8EXQ7ERG0e0IDzAFWhsF:7JZoQrbTFZY1iaCfhRAZt0J7
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-