General
-
Target
f93334ec49cb451073fd08c48477d6e68f548e5b30395142b88b7c15a250a936
-
Size
422KB
-
Sample
250224-r7dseayjv6
-
MD5
e726ed1fb5c6c751ceb4fa4b535fc963
-
SHA1
5c2398633c7e9e6a822d92774f52539c159b0dfa
-
SHA256
f93334ec49cb451073fd08c48477d6e68f548e5b30395142b88b7c15a250a936
-
SHA512
0bbb161ae66251c36ac18c04e42fb66d5a6c6037c3319e7d1470c483537e47bbf99668534ea622b6c265b660ac8037f6ebb96da7881eea5486ca2e91df18f06e
-
SSDEEP
6144:jQOd97ial5bSrnJSPxi0TKzhPQTLPpoZ8PzxnvU+sgHduq79lCiFCMZSoJ+WYwD5:jXJl5mH0TAQPPpg8tnVl1ZfVph
Static task
static1
Behavioral task
behavioral1
Sample
Frankpledge.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Frankpledge.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Vikingers.ps1
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Vikingers.ps1
Resource
win10v2004-20250217-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.tecnoperfec.com.bo - Port:
587 - Username:
[email protected] - Password:
!jSmDiCQmbT&
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.tecnoperfec.com.bo - Port:
587 - Username:
[email protected] - Password:
!jSmDiCQmbT& - Email To:
[email protected]
Targets
-
-
Target
Frankpledge.exe
-
Size
500KB
-
MD5
75c519548e92e3367469a0ff25cdca40
-
SHA1
da28d9041d26c1dca833c2765fd601bb8be4c878
-
SHA256
e252330158f8453a40b143203611716c0173005328a0d27436cd9ffac91d63fd
-
SHA512
e6c27a32bfa92a8ff1a5d44176d469efef5e2bddc2b7c390a682503d2035bb4a5d01b88dd1bcf3c19a4a07bba11eac94869cc08fc5afb0f7415e600bef8a3600
-
SSDEEP
12288:VQeEJFJYJbJPeJyxJxWJiJfJcJWJSJaJ2J/JSJFJ8JjJcJHJQJoXJSJAhwjJTJZ6:dEJFJYJbJPeJyxJxWJiJfJcJWJSJaJ2c
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/nsExec.dll
-
Size
6KB
-
MD5
51e63a9c5d6d230ef1c421b2eccd45dc
-
SHA1
c499cdad5c613d71ed3f7e93360f1bbc5748c45d
-
SHA256
cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f
-
SHA512
c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522
-
SSDEEP
96:W7GUaYNwCLuGFctpiKFlYJ8hH4RVHpwdEeY3kRlDr6dMqqyVgN738:Iygp3FcHi0xhYMR8dMqJVgN
Score3/10 -
-
-
Target
Vikingers.Sap
-
Size
55KB
-
MD5
8f7cae39d5fd60d3cc926d94e45b839f
-
SHA1
87c3bad45e79f6d89a6840d5580eab24674af89e
-
SHA256
6a3efb96bf5c84d6adae4fa699aa64f266d3f258cc03619cb03500e46a014caf
-
SHA512
03fe02e6c3d0f2072112c6037c592ec6472ed6d8a6d1826e30c1fc94ff27497452d9c6baed47d1115a6bf50d82847d845a6ca9bc7ab4d5b9a71eba6977e47211
-
SSDEEP
1536:kLubTbY0XWNAKh8bXfJZMncznLSxT0puR4wEC:DWAK0R+hDRr
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-