General
-
Target
PO# ENQ8864.Pdf.exe
-
Size
1.2MB
-
Sample
250224-j7cakstk15
-
MD5
ce5d04c4d15b7ae968c0f2cd2a81387d
-
SHA1
4d7334d66cdff4a0f1c3ddce81db245a1e3469c2
-
SHA256
74feceb928f3cd0ca47312eac2718f4210bce399335fd341bdeb456b2a09a230
-
SHA512
4f2e621a18373f71fdcb583e4c0777be10913ec41647f12919efef5b54d762170199e2e84e347f84a447f388ba3f1b61336f0d1e607988a3b0b061645f58445e
-
SSDEEP
24576:K5xolYQY6Du6J33O0c+JY5UZ+XC0kGso6Faa1Bs3jWY3:dYSu0c++OCvkGs9FaavsSY3
Static task
static1
Behavioral task
behavioral1
Sample
PO# ENQ8864.Pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO# ENQ8864.Pdf.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.frmontajes.com - Port:
25 - Username:
[email protected] - Password:
1Guelas+1986 - Email To:
[email protected]
https://api.telegram.org/bot7391124277:AAEAD7k2_c00owq0kQIitLTWNNPqqi9m41c/sendMessage?chat_id=7128988401
Targets
-
-
Target
PO# ENQ8864.Pdf.exe
-
Size
1.2MB
-
MD5
ce5d04c4d15b7ae968c0f2cd2a81387d
-
SHA1
4d7334d66cdff4a0f1c3ddce81db245a1e3469c2
-
SHA256
74feceb928f3cd0ca47312eac2718f4210bce399335fd341bdeb456b2a09a230
-
SHA512
4f2e621a18373f71fdcb583e4c0777be10913ec41647f12919efef5b54d762170199e2e84e347f84a447f388ba3f1b61336f0d1e607988a3b0b061645f58445e
-
SSDEEP
24576:K5xolYQY6Du6J33O0c+JY5UZ+XC0kGso6Faa1Bs3jWY3:dYSu0c++OCvkGs9FaavsSY3
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4