General
-
Target
INQUIRYS87636_5_PACKAGING_VIET_NAM.exe
-
Size
793KB
-
Sample
250217-nv55cazky9
-
MD5
e4df82ce8dc093a24fafe4091083f575
-
SHA1
f5e0a86185001ea17a47bd87974388bf1acf4dd1
-
SHA256
f5c2ca5c0224f07b3379faeb4d38d468e3266a939731a540700265568c5ee5a6
-
SHA512
6a0a2e726942782a77a48206bcb46c152cbd00844b809b1e42805e40aa1642367d6c6ee072113b250b58626c2835a708e2e15b06546bc30405352ac8a68997b1
-
SSDEEP
12288:+xgmP3PkrD+hZfVDdfk6UvpNVLmXNp5nzmCL/Z60hFqoOm034h4r4xmcks1YGkR:apsP+hDx8NVLeNp5zJ625EbrGm7Nd
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRYS87636_5_PACKAGING_VIET_NAM.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
INQUIRYS87636_5_PACKAGING_VIET_NAM.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.tmcksa.com - Port:
587 - Username:
[email protected] - Password:
smartyok4# - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.tmcksa.com - Port:
587 - Username:
[email protected] - Password:
smartyok4#
Targets
-
-
Target
INQUIRYS87636_5_PACKAGING_VIET_NAM.exe
-
Size
793KB
-
MD5
e4df82ce8dc093a24fafe4091083f575
-
SHA1
f5e0a86185001ea17a47bd87974388bf1acf4dd1
-
SHA256
f5c2ca5c0224f07b3379faeb4d38d468e3266a939731a540700265568c5ee5a6
-
SHA512
6a0a2e726942782a77a48206bcb46c152cbd00844b809b1e42805e40aa1642367d6c6ee072113b250b58626c2835a708e2e15b06546bc30405352ac8a68997b1
-
SSDEEP
12288:+xgmP3PkrD+hZfVDdfk6UvpNVLmXNp5nzmCL/Z60hFqoOm034h4r4xmcks1YGkR:apsP+hDx8NVLeNp5zJ625EbrGm7Nd
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2