General
-
Target
RFQ 6000069128-Eclipse Supplies & Services LLC.xlsx______________________________________________________.exe
-
Size
773KB
-
Sample
250203-kv4pqswqbv
-
MD5
5112b66efe4673b10d9a1e9d9f3de8dc
-
SHA1
f459a6d327a0fe94cbc141c6fcdc65eff81f18be
-
SHA256
0653cd81c0cf45dc2b510934a5f0c1c68d17729387f55f8f6a70b1b11f9cbacb
-
SHA512
5e1e1d66750e6cf07f23f28cb568ba99afd5ca5ee76f8d831094e9340fa30e02ea8ff1c71c917b4e5ce53a19311793e83748f0e488c12cfea993c1946dad5cf0
-
SSDEEP
12288:1YfPXqswecl91mDviO2b8bXqU2Sv//FQmmQ/MWzTjspH3hy55kJmDwnCD3J:0weclubX9//2mRLTjsLy55emDwCD3
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 6000069128-Eclipse Supplies & Services LLC.xlsx______________________________________________________.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RFQ 6000069128-Eclipse Supplies & Services LLC.xlsx______________________________________________________.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot8137547477:AAGivMJhPHGxbUXvVQxSLRx55JHHJUPnI3M/sendMessage?chat_id=6680692809
Targets
-
-
Target
RFQ 6000069128-Eclipse Supplies & Services LLC.xlsx______________________________________________________.exe
-
Size
773KB
-
MD5
5112b66efe4673b10d9a1e9d9f3de8dc
-
SHA1
f459a6d327a0fe94cbc141c6fcdc65eff81f18be
-
SHA256
0653cd81c0cf45dc2b510934a5f0c1c68d17729387f55f8f6a70b1b11f9cbacb
-
SHA512
5e1e1d66750e6cf07f23f28cb568ba99afd5ca5ee76f8d831094e9340fa30e02ea8ff1c71c917b4e5ce53a19311793e83748f0e488c12cfea993c1946dad5cf0
-
SSDEEP
12288:1YfPXqswecl91mDviO2b8bXqU2Sv//FQmmQ/MWzTjspH3hy55kJmDwnCD3J:0weclubX9//2mRLTjsLy55emDwCD3
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2