General
-
Target
EFT Remittance Slip for Due Invoice.exe
-
Size
1.2MB
-
Sample
250129-kjypca1jdp
-
MD5
8c6ad00d939323abfb5ebef28bc8ca00
-
SHA1
b80b7621a8af48cd62361b938f8727d181661f2f
-
SHA256
eb3dcc6f02b890aeaa2368161d863b645a4c115bb4385278f80335ffb6143041
-
SHA512
2b3365e3c5d865502121fbae148158aef1d3a9ada2b9152d997c96bad5aa51247a7c1eea1dcea48c98ba09b547b0f58450e2c3e3c62ba80d15571a432d72fc04
-
SSDEEP
24576:KAHnh+eWsN3skA4RV1Hom2KXFmIaIcPGZV+2urmZ5XEo5:dh+ZkldoPK1XaIcPGmrC5f
Static task
static1
Behavioral task
behavioral1
Sample
EFT Remittance Slip for Due Invoice.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
EFT Remittance Slip for Due Invoice.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.norcalwholehousefans.com - Port:
587 - Username:
[email protected] - Password:
Pythonk2024!@#$
Extracted
vipkeylogger
Targets
-
-
Target
EFT Remittance Slip for Due Invoice.exe
-
Size
1.2MB
-
MD5
8c6ad00d939323abfb5ebef28bc8ca00
-
SHA1
b80b7621a8af48cd62361b938f8727d181661f2f
-
SHA256
eb3dcc6f02b890aeaa2368161d863b645a4c115bb4385278f80335ffb6143041
-
SHA512
2b3365e3c5d865502121fbae148158aef1d3a9ada2b9152d997c96bad5aa51247a7c1eea1dcea48c98ba09b547b0f58450e2c3e3c62ba80d15571a432d72fc04
-
SSDEEP
24576:KAHnh+eWsN3skA4RV1Hom2KXFmIaIcPGZV+2urmZ5XEo5:dh+ZkldoPK1XaIcPGmrC5f
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-