General
-
Target
siparis po1_ BYZ01072410 - Turkiye CRSP0177462 fiyat teklifi 01024.exe
-
Size
755KB
-
Sample
250217-mn5pkaykan
-
MD5
8dcbbeef72e8d15b2395aa23d16a65df
-
SHA1
161633236c4af012f13649823991f855d98c2812
-
SHA256
ff040c7bf107a9f1287d37bf802069204275ae3e00df7ea4ac0afc8ac41a7af2
-
SHA512
09be92945689c50b366a84d7aac90fadcc0725ed85b11e806b3f404682820d115c63cae6deb2ff6029f579fbe6be3f9c8444617d1baf05468482dadf50b9b386
-
SSDEEP
12288:RxgmMOzEkJ4Yo8qdSRZ85rKo6GlljX7ybla0So6WE0hrXInl:n7zJ4d8qkwWycblIWJhral
Static task
static1
Behavioral task
behavioral1
Sample
siparis po1_ BYZ01072410 - Turkiye CRSP0177462 fiyat teklifi 01024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
siparis po1_ BYZ01072410 - Turkiye CRSP0177462 fiyat teklifi 01024.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
vipkeylogger
Targets
-
-
Target
siparis po1_ BYZ01072410 - Turkiye CRSP0177462 fiyat teklifi 01024.exe
-
Size
755KB
-
MD5
8dcbbeef72e8d15b2395aa23d16a65df
-
SHA1
161633236c4af012f13649823991f855d98c2812
-
SHA256
ff040c7bf107a9f1287d37bf802069204275ae3e00df7ea4ac0afc8ac41a7af2
-
SHA512
09be92945689c50b366a84d7aac90fadcc0725ed85b11e806b3f404682820d115c63cae6deb2ff6029f579fbe6be3f9c8444617d1baf05468482dadf50b9b386
-
SSDEEP
12288:RxgmMOzEkJ4Yo8qdSRZ85rKo6GlljX7ybla0So6WE0hrXInl:n7zJ4d8qkwWycblIWJhral
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2