General
-
Target
29012025_1135_28012025_Drawing and Specifications.zip
-
Size
707KB
-
Sample
250129-np2vqswrgw
-
MD5
4193e7b19d558ee94c160e2645d220f2
-
SHA1
e78913419cca905bb238de4027368941cdd3f263
-
SHA256
bde21c84fd935e0ffd1f9eca6970bcc26092bbd757afb37a649f57cb323548bb
-
SHA512
bf038e8f2a52c9ba88042f770bdcb1cda3cb742db291911f6ce040d9eb386517dc9b7c301fd97fb0c47d30f7adbfd355600ca8a266aca1f6587588be7dddc293
-
SSDEEP
12288:qTZKujXe1bZpIdraSNk5zqZtdke7t/2ZwCRRPsJVmZUne4FuOvUrs6QJy72fpf:YZeDwaSu5zqZ7keRs3Rk6Zme4Fv8rsDR
Static task
static1
Behavioral task
behavioral1
Sample
Drawing and Specifications.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Drawing and Specifications.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.aktagor-prom.by - Port:
587 - Username:
[email protected] - Password:
71z&rRC84 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.aktagor-prom.by - Port:
587 - Username:
[email protected] - Password:
71z&rRC84
Targets
-
-
Target
Drawing and Specifications.exe
-
Size
824KB
-
MD5
7a220273e21f0c8b4b4d6b07c54db0ca
-
SHA1
2b2b1d041700f6560fc77c88e305d6feff3a1264
-
SHA256
804cb8891f2829caf32366e9efbbeedd19eab55288ca94702d1c29ffded6d463
-
SHA512
a90d2ad55caccb0ff4679bb06ef1c5381382c8b80c0a451fe608c277877b51f6a0d228363e0d60c06f3e279dcb92c37713b3797f330f88f3f05e863e5d82e889
-
SSDEEP
12288:AiZY00jfVcebVZBIdraQQZtvkpnbIoZZocPshVmZanc4F4OvUr040:AiZdWJ/oaQQZJkpsQrkyZoc4F58rU
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-