General
-
Target
RFQ for PR#029494-2025-Order.GZ
-
Size
831KB
-
Sample
250218-lq8zbszjbj
-
MD5
955f83abf9098d629677cac0bce82817
-
SHA1
0ce8ddce561631f8f105d57564dd07c298ce976a
-
SHA256
cb69bb35525536e9bfbe0df3a6f236b34521adad075f65fa0a86c21cfb35bbd0
-
SHA512
1b348770956963ccf70bde464da5224a922995765cd59113c40299882a04ca35159a5416b0d3a89525706b30a4b500fe8fcbbea20a13914ed3bf79b1c49d9d16
-
SSDEEP
24576:Bqv75jpAWwpIIybwyi8AqN8tKoCmzXw67x7Qtl:MvbWbewyeqN8omZ7Q7
Static task
static1
Behavioral task
behavioral1
Sample
RFQ for PR#029494-2025-Order.gz
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7741549877:AAGvFhZZl3oxTcYaKtJFu52Jb5_V7o5wbi0/sendMessage?chat_id=1224745150
Targets
-
-
Target
RFQ for PR#029494-2025-Order.GZ
-
Size
831KB
-
MD5
955f83abf9098d629677cac0bce82817
-
SHA1
0ce8ddce561631f8f105d57564dd07c298ce976a
-
SHA256
cb69bb35525536e9bfbe0df3a6f236b34521adad075f65fa0a86c21cfb35bbd0
-
SHA512
1b348770956963ccf70bde464da5224a922995765cd59113c40299882a04ca35159a5416b0d3a89525706b30a4b500fe8fcbbea20a13914ed3bf79b1c49d9d16
-
SSDEEP
24576:Bqv75jpAWwpIIybwyi8AqN8tKoCmzXw67x7Qtl:MvbWbewyeqN8omZ7Q7
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2