General
-
Target
New Order.exe
-
Size
1.2MB
-
Sample
250131-d5b9xaxpht
-
MD5
ea41e93a253b77f1fd4f71a2053ac0b0
-
SHA1
1b30121615594e0fe6efb863909f6f8fa5125981
-
SHA256
28b1e929db9b031e6b2e9d4923775df3193858adb4c5e4c85e292f6e5c4baa66
-
SHA512
088346b5e4468ecf97564c28191d05d5ed00c730a0e1acb742fea410827490a78e617d70e49bae85958168540632bd9e6fd9c8c882251e356bafc5dcd2fdc699
-
SSDEEP
24576:GA9km6k/IwRYbiBeKGCc30TvMHxs+wZVowOuuEH7excLEw377AT:H9sk/IRUnHTvMHxs+wZVfZ377AT
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New Order.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.jhxkgroup.online - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Targets
-
-
Target
New Order.exe
-
Size
1.2MB
-
MD5
ea41e93a253b77f1fd4f71a2053ac0b0
-
SHA1
1b30121615594e0fe6efb863909f6f8fa5125981
-
SHA256
28b1e929db9b031e6b2e9d4923775df3193858adb4c5e4c85e292f6e5c4baa66
-
SHA512
088346b5e4468ecf97564c28191d05d5ed00c730a0e1acb742fea410827490a78e617d70e49bae85958168540632bd9e6fd9c8c882251e356bafc5dcd2fdc699
-
SSDEEP
24576:GA9km6k/IwRYbiBeKGCc30TvMHxs+wZVowOuuEH7excLEw377AT:H9sk/IRUnHTvMHxs+wZVfZ377AT
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-