General
-
Target
ccdfb0bc32e944357162de9e2504cbbef48d8475ffa3c1ee80dc621bc8bef30e
-
Size
649KB
-
Sample
250225-fj6mqswqs2
-
MD5
b707d481783023bbe7fe038a423dca2d
-
SHA1
602675e4c3228c9b7df03278805d7a677e0b406a
-
SHA256
ccdfb0bc32e944357162de9e2504cbbef48d8475ffa3c1ee80dc621bc8bef30e
-
SHA512
12d6d72a479e1ba7a7135997bfc207d4f87caa3a259aa42a688eb1e80ab9fa39b10fd3f68fbcf4c0cf2f851fefed45f71567376c9442879fe0177bc83300e565
-
SSDEEP
12288:2DxfdADU8e677zlLIBjJaQfXTGX9w5EvXcAgNgU2V6+8xQfcnTL:2Dxfd38eiJkgGDGXe5EPclglV6+dfk
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NEW ORDER.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.progistics-int.com - Port:
587 - Username:
[email protected] - Password:
P@ssw0rd123
Extracted
vipkeylogger
Targets
-
-
Target
NEW ORDER.exe
-
Size
816KB
-
MD5
0366260051da009b00271d14d8bca047
-
SHA1
0f6d8f1ec944cb86d4bbda14e51cb911e7996050
-
SHA256
2830579fe45710050140d4c29d104a9fc36c7b6b80d5f7833a797dd129dfba34
-
SHA512
1463fa19380bfc7703c51a9060fa7dd2b78d03db6d1fae32aa693fc6662cf7417378f160471c5fdaae29b627f071cccee4710ef66ebc84927138347b44e016c9
-
SSDEEP
12288:odOW5FmeYyT2+gGYueV3oONeTlrSAB7Pw/yJ3aSfTVYqDY5f1w6ONcyT2:m3Fmet0dqBrS0M/uaSpYtyB
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2