General
-
Target
INQS_RFQ441632-A_Shenle_Corporatin_Matrials_productions.exe
-
Size
836KB
-
Sample
250219-jyb88atjz6
-
MD5
379881c017323bbb89ba4617d0d3df7c
-
SHA1
a57be5d3ca8e6410f411cbb8582334601e15c479
-
SHA256
58c1bb1c19cd551261465044f769a313549a574a345a2754414e48f8fc08bcbf
-
SHA512
01990e00bfaaffd16488f36ff0bf894134d6203d671652937bbcb264db2dadd89dfcb057dae26f1c883bab17cd20dc948e015876b16ee1116b850ba9bd6b5e33
-
SSDEEP
12288:YPqbnb4/ZPEYrwzaNpKMJiQ/h0ivfGWQYFrsNyRCURjmqzGLYtCGZAX/L+lkR:Dg2ogH9NxURiqzfVGX/LZ
Static task
static1
Behavioral task
behavioral1
Sample
INQS_RFQ441632-A_Shenle_Corporatin_Matrials_productions.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
INQS_RFQ441632-A_Shenle_Corporatin_Matrials_productions.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.tmcksa.com - Port:
587 - Username:
[email protected] - Password:
smartyok4#
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.tmcksa.com - Port:
587 - Username:
[email protected] - Password:
smartyok4# - Email To:
[email protected]
Targets
-
-
Target
INQS_RFQ441632-A_Shenle_Corporatin_Matrials_productions.exe
-
Size
836KB
-
MD5
379881c017323bbb89ba4617d0d3df7c
-
SHA1
a57be5d3ca8e6410f411cbb8582334601e15c479
-
SHA256
58c1bb1c19cd551261465044f769a313549a574a345a2754414e48f8fc08bcbf
-
SHA512
01990e00bfaaffd16488f36ff0bf894134d6203d671652937bbcb264db2dadd89dfcb057dae26f1c883bab17cd20dc948e015876b16ee1116b850ba9bd6b5e33
-
SSDEEP
12288:YPqbnb4/ZPEYrwzaNpKMJiQ/h0ivfGWQYFrsNyRCURjmqzGLYtCGZAX/L+lkR:Dg2ogH9NxURiqzfVGX/LZ
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2