General
-
Target
07ecf938cb842fe35f0ac8cdab40e104411e7763d80da2a1a199a50d03349ea1.z
-
Size
683KB
-
Sample
250129-chzw1sxmgv
-
MD5
9554608e35975ed4875fa05461b4775c
-
SHA1
7a7567737768864cc759a6b6735669590067be7d
-
SHA256
07ecf938cb842fe35f0ac8cdab40e104411e7763d80da2a1a199a50d03349ea1
-
SHA512
a0e1c3d2b698e12762887f740da0cec0efa45e18b2677e2b92028f3d95b095fa57802a9b1fa8837f47487ff498dd8c3b5c726eb2e69d31d544dd65b9fc74dfa2
-
SSDEEP
12288:waRjGAgfTsRhBPrg5B4VSK1TAjN5FR1Xeqbj3fQbo9AepE3ZfH:tj5BzBDgoVN1MntPvONe+3F
Static task
static1
Behavioral task
behavioral1
Sample
Mechanical Tendering Engineer – Infrastructure.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Mechanical Tendering Engineer – Infrastructure.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.htcp.homes - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Targets
-
-
Target
Mechanical Tendering Engineer – Infrastructure.exe
-
Size
821KB
-
MD5
429c7a3322bd34eafacec92baba5ec09
-
SHA1
61bbaec2ed91d5885cb2ee21e23b781ac91824d9
-
SHA256
071d0a5405c4bc0d3319aa4756ad6afb703c8462d1a6d616765eeae22dcdbd30
-
SHA512
8181ee44d934d6303f4ad2414741d4b422cdc2b038332ed13330bc6c8b3eb75d57dd1905a976a24ba40a78a2634c11539338db141ada5e4e810c2bef464c4d33
-
SSDEEP
12288:qKY00jgMZ9+x/KDUBfssWfQoIGEcFC/oqE1TqIKqmuUN93ANpe0:qKdjMZ9+x/pBEDfycFC/A1tZmV3el
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2