General
-
Target
23012025_1018_23012025_DEBIT NOTE Re Payment request CMA CGM __ - 1004053123.pdf.z
-
Size
847KB
-
Sample
250123-mb479sxkem
-
MD5
d4aaf0162ca645d3139f930c89809320
-
SHA1
fc7b8dc0522578482361d4a514212f888f7e9c6b
-
SHA256
57579bbd9fba228c4db086ffd7f63f093c1f7b6ff94345a3397968a27260f1fc
-
SHA512
42b73a85dec2699a0ad4eb745f7019844f45140e26d8f0ce61e2e84e01f7f0fb5568b26f2ed04274378f07327a7f729f771dcf35e05cb767562ff58529db13c6
-
SSDEEP
12288:8sNx+QKbK8kIyYCedTnjjzjYJ0tL+R/zBd7bTLBeVFJSJBvVLSWZbpPQayFC8D:8U+Q7KyXetVpaV5L38WpRtyIg
Static task
static1
Behavioral task
behavioral1
Sample
DEBIT NOTE Re Payment request CMA CGM 帐单 - 1004053123.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DEBIT NOTE Re Payment request CMA CGM 帐单 - 1004053123.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
cash@com12345 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
cash@com12345
Targets
-
-
Target
DEBIT NOTE Re Payment request CMA CGM 帐单 - 1004053123.exe
-
Size
1.2MB
-
MD5
7d0c3e8ad0c9e73d5fb027a6ab1fd8e3
-
SHA1
2fcc79b1030844814dde5d595f5b1aee2ed2455d
-
SHA256
d67780a7f2fc2ded85c2ccdffdac398e9dac01759260536d61ef40744505ca91
-
SHA512
e3a77e3fc6f9bacfb028ca56e62534de79cc0cc69709d5a8e36bb4d918881d59a2e478a1a21039c1a6f6a924be668c500bd5955869237628246a4802432d9885
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCR3wuPqiUQ8EXQ7ERG0e0IDzAFWhsF:7JZoQrbTFZY1iaCfhRAZt0J7
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-