General
-
Target
c96dc43c5a32f513416c254b11323baf6fe89c15cb651b627a7341736baec741
-
Size
725KB
-
Sample
250218-jzgkbszpz4
-
MD5
5aa8b87bed60180501d2b79ccd5eb82c
-
SHA1
bfd8287292c7b466e259082f7d50b0703470d5cf
-
SHA256
c96dc43c5a32f513416c254b11323baf6fe89c15cb651b627a7341736baec741
-
SHA512
439af084f462836064f848665fc1da4fae86049a0401672d20c739cbc9fe448aa8e27a9823fbabe6696e5f898a8be9409c5519687bca58eff5ff30f9fa773b92
-
SSDEEP
12288:40uRimoByhUCHkeGrcjY0c2GDAV2Me/vgEZ3/0aaDCf28HUpzR2QB7HDC887/xXc:BuRvoBy2CrGr8Y05Gaengi/h2gUpPTDf
Static task
static1
Behavioral task
behavioral1
Sample
250122 (BIG GEORGE) - INVOICE & SERVICE REPORT.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
250122 (BIG GEORGE) - INVOICE & SERVICE REPORT.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.cybertechllc.top - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@ - Email To:
[email protected]
Targets
-
-
Target
250122 (BIG GEORGE) - INVOICE & SERVICE REPORT.exe
-
Size
1.1MB
-
MD5
ebbb79aac4f4b4bcf4aaf9a4770ecac4
-
SHA1
ba8a196dfb2b1f35251fd1e44ab88c7503f80c90
-
SHA256
03a1067ea97c62599aed6ca14c23d9310b2fcfd406a97875c730d41b92f4cb38
-
SHA512
6d5301ef69bf5903e1a29b9805d597ea47cafcf913cab502397be4708e09e991b05810025cd4d47961f2a8e363e81c5a4e895819ffb46ddaa2d44e524636662b
-
SSDEEP
24576:oqgGL8Y01qoeZgGdYqggpJD3CR7VpI8d:PLLjoeZgipJi7T
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2