General
-
Target
0ef15be52461382d4912e2ad9772e34408298b239ba8979e0dd0e2790bc6d89b.zip
-
Size
689KB
-
Sample
250125-cptcta1rcj
-
MD5
5113b8368a789da18cc83da48f5bd9e7
-
SHA1
e23817bf902d8e27a52725747562b8a325ec7fc6
-
SHA256
0ef15be52461382d4912e2ad9772e34408298b239ba8979e0dd0e2790bc6d89b
-
SHA512
6a8c88cf92639f6ebfd8e26dc628a5e1eda26c0cd28a7206030ceb1c321a6041cde270a5cfa3fa1ddaa971fe85bd03174ea37a1223af9910f031b3ea1d05844f
-
SSDEEP
12288:j7X6DtQdLyW2YY/h8YnkqNMzq74N4tqj4rL7O45VG/egfmb+SZJK8Km4mR0:j7YudGYYp8ghMhNhj4rLi6VJgfO92H
Static task
static1
Behavioral task
behavioral1
Sample
New Order #837989.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New Order #837989.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.aktagor-prom.by - Port:
587 - Username:
[email protected] - Password:
71z&rRC84 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.aktagor-prom.by - Port:
587 - Username:
[email protected] - Password:
71z&rRC84
Targets
-
-
Target
New Order #837989.exe
-
Size
780KB
-
MD5
c5b2f0199c91bcb176ab0867737b2a8c
-
SHA1
9265256c80c7e845b484386810c15a5d5ba56868
-
SHA256
13fd36bd0ad2ef303ded0dac6b7cd6d4326ffebb08ff914eb44a6e75c52e8289
-
SHA512
463a7a803282b1c7f2b191ca2784d53d3299abd9a53cc06c1e71807ccccc7519d4fb3a8d2176c1e9f5331ae093b28cae274450426849a6226b9a6705df705827
-
SSDEEP
12288:pZtu7+J+LSY/h4Yn2wNOVzfq3R7yqVfaqG/Qcav9om2b+iZJKfA:N/JySYp4gbOVziBuqFcY9jeD/
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-