General
-
Target
Invoice-1150.exe.v
-
Size
768KB
-
Sample
250125-dzfp5svmeq
-
MD5
ef31d9a0edb030c28669b85712413cb1
-
SHA1
59e9c21a4babd9269fbb72046fb448ba66d16729
-
SHA256
20bd37d1bc1d656f678d99c15df2610cb2e2f9c4e0b294e504e8508be4c2f658
-
SHA512
cd051d17fc75ecfa8ba6fcfb6307f70879ee26c29af2bd99507e143956fc0ec510fb3a5b3b22bfbef1c959d0dfab18ee1b5b009dacc4e8768e8bcd9781526ab6
-
SSDEEP
12288:pqcA1fy1MqCNbvYt4P4Id76TXpDyLi9RqGUGgPKAQj9BM1FPgw+q28xH1xV3KdEP:+5PNbg4h2T5OqqGWKZM1tpH57Va2m
Static task
static1
Behavioral task
behavioral1
Sample
Invoice-1150.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Invoice-1150.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.ruchiraprinting.com - Port:
587 - Username:
[email protected] - Password:
Ruchira@PR12 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.ruchiraprinting.com - Port:
587 - Username:
[email protected] - Password:
Ruchira@PR12
Targets
-
-
Target
Invoice-1150.exe.v
-
Size
768KB
-
MD5
ef31d9a0edb030c28669b85712413cb1
-
SHA1
59e9c21a4babd9269fbb72046fb448ba66d16729
-
SHA256
20bd37d1bc1d656f678d99c15df2610cb2e2f9c4e0b294e504e8508be4c2f658
-
SHA512
cd051d17fc75ecfa8ba6fcfb6307f70879ee26c29af2bd99507e143956fc0ec510fb3a5b3b22bfbef1c959d0dfab18ee1b5b009dacc4e8768e8bcd9781526ab6
-
SSDEEP
12288:pqcA1fy1MqCNbvYt4P4Id76TXpDyLi9RqGUGgPKAQj9BM1FPgw+q28xH1xV3KdEP:+5PNbg4h2T5OqqGWKZM1tpH57Va2m
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-