General
-
Target
MT 103 #0012325132436402634.pdf.exe
-
Size
827KB
-
Sample
250128-l17t1svqbq
-
MD5
6f41fbaa7470af3cc1c6194d997b63d6
-
SHA1
9d10a3b0bf95d04c4834ebf380f22b7ad088c41e
-
SHA256
a62c7c9c769aa4ffdd8729d5b5c688b1ef831be21d64247d75e7285d86e78af4
-
SHA512
316df40ccb2cb77fc825f74e18ec03579211978438bfb8ab88e394d2d5f6008ae565efcba3dc52879c3953e90d930d788df3b2b78d14045ced315e48279f4cc7
-
SSDEEP
12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCpeVyxldN/CLgUQr:uRmJkcoQricOIQxiZY1iaCpcap/q3G
Static task
static1
Behavioral task
behavioral1
Sample
MT 103 #0012325132436402634.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MT 103 #0012325132436402634.pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.npmmachinery.com - Port:
587 - Username:
[email protected] - Password:
^@SC}ST5oCG- - Email To:
[email protected]
Targets
-
-
Target
MT 103 #0012325132436402634.pdf.exe
-
Size
827KB
-
MD5
6f41fbaa7470af3cc1c6194d997b63d6
-
SHA1
9d10a3b0bf95d04c4834ebf380f22b7ad088c41e
-
SHA256
a62c7c9c769aa4ffdd8729d5b5c688b1ef831be21d64247d75e7285d86e78af4
-
SHA512
316df40ccb2cb77fc825f74e18ec03579211978438bfb8ab88e394d2d5f6008ae565efcba3dc52879c3953e90d930d788df3b2b78d14045ced315e48279f4cc7
-
SSDEEP
12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCpeVyxldN/CLgUQr:uRmJkcoQricOIQxiZY1iaCpcap/q3G
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-