General
-
Target
OFERTASOLICITADA.tar
-
Size
495KB
-
Sample
250217-vm97na1qz3
-
MD5
b353f32d92ff7f719befa7093562003e
-
SHA1
b63db3be9c76333402b6817cf2a240def66ecc99
-
SHA256
b054a16fe0f94bbe2cc9617118feb2b4c032636dc38aa76d9be4b9c8fc49d55d
-
SHA512
bd965516e7ffadf84fcbe17e7a4356ca51469a1c7390bb5e11b0210d2e399d2d3a80fc8455be68cdc853d2089eafd78e21ebf52f074df135807e2569680a1ce3
-
SSDEEP
12288:CUatc/gP29iwihJafg1LUBCLousN3fjAmBmw:CUatj2MhAB73fjAAmw
Static task
static1
Behavioral task
behavioral1
Sample
factura solicitada..exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
factura solicitada..exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
Concludence.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Concludence.ps1
Resource
win10v2004-20250207-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.novacitacor.pt - Port:
587 - Username:
[email protected] - Password:
#Novasystem123# - Email To:
[email protected]
https://api.telegram.org/bot7221326078:AAGaWyrW9EKGD1uh5gWS77zyAjwVr5QBesc/sendMessage?chat_id=7159751206
Targets
-
-
Target
factura solicitada..exe
-
Size
493KB
-
MD5
6124034fe55707e3ec7a9940b36a2640
-
SHA1
fa817c784d46fdcfc065a264713c82f5f53b7288
-
SHA256
aa928f80e184381e6cb9e2a8e159334e3494999165cf97bcd71bdfbb61dce2bf
-
SHA512
6ea1a6caddac4f0696731f42a726a5df960aed0452aa347348805ee46f7e381be1fe4feeb6f79fa01883c248e99190a106e026973eb4dd93ca008605c6e8169e
-
SSDEEP
12288:sUatc/gP29iwihJafg1LUBCLousN3fjAmBmwG:sUatj2MhAB73fjAAmwG
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook profiles
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Concludence.Cha
-
Size
51KB
-
MD5
1678eaebcc616fdd486b73c0d0f9a765
-
SHA1
8e9d45a247bf04385e368f16ae88ac4c70c5ca4f
-
SHA256
ee054a99730186790f4a20abe48b59b4254b5bb5888b4cf685f7a74092a9a6e6
-
SHA512
7bec8100642738d1cf759f3a5226a5e96defc56697235ef50444d35fdaf82bfab8eed5addbff50b358b9ab7caf5ccbe65cea09d7d0be35a6de7f6614d2b78172
-
SSDEEP
1536:pxAaLXZA+Iki28ydNcQOb01QZKVDxXAJb:px3dAwnXeYdNwJ
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-