General
-
Target
Item list.pdf.001
-
Size
659KB
-
Sample
250128-ls3v4avngm
-
MD5
a4f7739528d2b31d057de26da931f434
-
SHA1
2bc0487fab4cd201b13e18f1ab4f82b19df0c9f8
-
SHA256
2da26ed996679b7e984ae1080a1accb5205ce9957762c9f5f4d5dfbc7ba77060
-
SHA512
7d7f01d5e37f7e83d9b9aab0b8f26b71b627469f0b7abccc6e6f11273cd7ff7e9c9dd77bcca8f4d2b6ab4aad716f62a78a8d0929b5b9eb71f5172d1a598035b5
-
SSDEEP
12288:GcEO1IG236YHX7Gt+zolQjL1l7VjFeEb73snUZQTZ6aUsCHGP:GUe36c7s+z+QHb5tzEF6NsCHGP
Static task
static1
Behavioral task
behavioral1
Sample
R42pO9hQtYC159l.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
R42pO9hQtYC159l.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.bombayintegrated.com - Port:
587 - Username:
[email protected] - Password:
WmZBeNSyYIhu - Email To:
[email protected]
Targets
-
-
Target
R42pO9hQtYC159l.exe
-
Size
743KB
-
MD5
b3dd9590b35636f2580cfa18525669b2
-
SHA1
4fa53976f2a330c71c40efbaa51ac391910c3b1e
-
SHA256
77a0e4d0d77865d4261c9c73dc0da3e63a64755f605014d540c1f2b4b62c6bc0
-
SHA512
ef651cca3d9afdfe0d091dddfcff3bfa320d4993ea4a93b6a9819a763fe1a89a41eb57570ea8f046cfe058f1a6f2bcd6981434cbf024cce190b32e03e9cef097
-
SSDEEP
12288:Rjr0osPnfoWzylGZtMouH7SaeThSiwpCb6xj1N9tBVNgkZa3MBR8TUs9H0z:pR4QW+ALMKtThVwAqj1N6kZ34TUs9
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-