General
-
Target
30012025_1641_29012025_EFT-Remittance_for_Overdue_Invoice.GZ
-
Size
642KB
-
Sample
250130-t7fccawqg1
-
MD5
b5f7d77355f0c0664ffe8732bfe7eeae
-
SHA1
dc03b7bf272cea0c5f3aa0a97a72d50d9a100848
-
SHA256
0d53d6f713a2b7f20008c3652da422c6293c63ba3ba72fce0cb526e69d39d57d
-
SHA512
5bf0c6c2296d9afe90ebf7bfd95963fe7b67297960662e8499a68d3551a8c24e56062986db5ee5c4ce609c3bcbd2c2d709b9e0f88e0867fd9f2426155dfcc979
-
SSDEEP
12288:nBZjKNvJrLBVN2xa81YzG45UMscbx1gVTn8PIEK+co+lJmp3la418G63TH:n3+NBnNIcG45UT2x1gVTni8+tqJmBNPY
Static task
static1
Behavioral task
behavioral1
Sample
EFT-Remittance for Overdue Invoice.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
EFT-Remittance for Overdue Invoice.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
vipkeylogger
Targets
-
-
Target
EFT-Remittance for Overdue Invoice.exe
-
Size
1.2MB
-
MD5
4356632cd55a6b5f7b9f49dc17ccee00
-
SHA1
174bffb9781b6f4e455bba193a6921f57bc7f079
-
SHA256
62c6436c72f6e31fe3598b4e79600f6262a5fcce63fe6a780e6644669f2b5e63
-
SHA512
4db5ddf36fc19e3389f4d2b24d0a4e5cf923a8a43fd57e5b61b5d1522a70215615a58ad5a605b9dbc6f5f112db06b2902bd6fdb0811d322565ecda2fbf6fc382
-
SSDEEP
24576:RAHnh+eWsN3skA4RV1Hom2KXFmIakcPGVsvv9BcdHy+oOZ7d8N5:oh+ZkldoPK1XakcPGVsnTc9iIpq
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-