General
-
Target
Invoice#2968 (PO#83270) pdf.exe.v
-
Size
832KB
-
Sample
250131-fet35sylfw
-
MD5
2fa6791b73bec4f05a53347a37c0a2e4
-
SHA1
c5e240318972c79afcb40b8b3cf185cfa523e0ee
-
SHA256
517c2ec612e5eef224a280a1509a9c646237a0295ab0a26534e362f3dace92e9
-
SHA512
e6e4d6f4644cd7452551574f5959c86ecdde156412294dc27651b9efbdfb13fccf5031432e3fb0d02a2d64647762bcba13c89573d361c2fdfd40194c2f6d9c9a
-
SSDEEP
24576:fO6e12gVzguVxwVzN6vET4XvjkFy05e5v+:W912gVsjR0gukkT5v
Static task
static1
Behavioral task
behavioral1
Sample
Invoice#2968 (PO#83270) pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Invoice#2968 (PO#83270) pdf.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Global786@ - Email To:
[email protected]
https://api.telegram.org/bot8066712820:AAEAb01u8B6eDO5xCMdAz6XCOHC_L2RpVGo/sendMessage?chat_id=7667424178
Targets
-
-
Target
Invoice#2968 (PO#83270) pdf.exe.v
-
Size
832KB
-
MD5
2fa6791b73bec4f05a53347a37c0a2e4
-
SHA1
c5e240318972c79afcb40b8b3cf185cfa523e0ee
-
SHA256
517c2ec612e5eef224a280a1509a9c646237a0295ab0a26534e362f3dace92e9
-
SHA512
e6e4d6f4644cd7452551574f5959c86ecdde156412294dc27651b9efbdfb13fccf5031432e3fb0d02a2d64647762bcba13c89573d361c2fdfd40194c2f6d9c9a
-
SSDEEP
24576:fO6e12gVzguVxwVzN6vET4XvjkFy05e5v+:W912gVsjR0gukkT5v
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-