General
-
Target
Original Shipping Docs.exe
-
Size
520KB
-
Sample
250129-rjed2azqgy
-
MD5
fa95d941bc3b0a98262652b13b7a3290
-
SHA1
5d09e1eec6ffdc8bc8669d18f6f655b53cb9402e
-
SHA256
2bedd3f965d463529bb4096342c1741a19f28cbf7f2f222d2cb6513ddfe109bf
-
SHA512
20ec5b835e191104735897ace988978f0d36486fe7f98f6171fe4b537515250bd61897ae80029fe28c100bcc81d0e1cf78f52899de83f461f4e88d07329ca9de
-
SSDEEP
12288:NYV6MorX7qzuC3QHO9FQVHPF51jgc4ui42BiElpCOHg0/EWJ:iBXu9HGaVHXxVElpbgLWJ
Behavioral task
behavioral1
Sample
Original Shipping Docs.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Original Shipping Docs.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.npmmachinery.com - Port:
587 - Username:
[email protected] - Password:
^@SC}ST5oCG- - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.npmmachinery.com - Port:
587 - Username:
[email protected] - Password:
^@SC}ST5oCG-
Targets
-
-
Target
Original Shipping Docs.exe
-
Size
520KB
-
MD5
fa95d941bc3b0a98262652b13b7a3290
-
SHA1
5d09e1eec6ffdc8bc8669d18f6f655b53cb9402e
-
SHA256
2bedd3f965d463529bb4096342c1741a19f28cbf7f2f222d2cb6513ddfe109bf
-
SHA512
20ec5b835e191104735897ace988978f0d36486fe7f98f6171fe4b537515250bd61897ae80029fe28c100bcc81d0e1cf78f52899de83f461f4e88d07329ca9de
-
SSDEEP
12288:NYV6MorX7qzuC3QHO9FQVHPF51jgc4ui42BiElpCOHg0/EWJ:iBXu9HGaVHXxVElpbgLWJ
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-