General
-
Target
5f12f30d2c413e4d5a66d9e5b42ab2bb508127e069849f94103fa326c972f510
-
Size
809KB
-
Sample
250227-cjrl2a1qz5
-
MD5
1b02f25a68c5d515dd89f1e4fca9ba63
-
SHA1
9c89b45e9532e9c01ad543c4fb0e6ace2ad81e6c
-
SHA256
5f12f30d2c413e4d5a66d9e5b42ab2bb508127e069849f94103fa326c972f510
-
SHA512
7376de76b5563285e5a5090716f165579ade187d7858b3a86a8fbea5637faf6fcf692c14781eb41c93549127961e1c3d0520e6fd2307c9693e7e6c846db1ed9b
-
SSDEEP
24576:2ofEMlWtxnU1f1CHRetef4JchN9hU6mpKy+YiSq1eVhb:JwxnRwtewyzFmpKyCSbVB
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order - Hi tech Insulator SAPPL23240999.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Purchase Order - Hi tech Insulator SAPPL23240999.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.saad-syria.com - Port:
587 - Username:
[email protected] - Password:
slmrs2901000201 - Email To:
[email protected]
https://api.telegram.org/bot7563311736:AAFJewS8I9s6_mnl_sUm8SW4RjIOXWEEyVI/sendMessage?chat_id=6386262734
Extracted
Protocol: smtp- Host:
mail.saad-syria.com - Port:
587 - Username:
[email protected] - Password:
slmrs2901000201
Targets
-
-
Target
Purchase Order - Hi tech Insulator SAPPL23240999.exe
-
Size
982KB
-
MD5
25c92b854587494825e5cd9b32ebb682
-
SHA1
6eea1700fab7342a8078f612e0920fa2f84a1cfd
-
SHA256
0be6a7f44926700fa4c215c731f2609401648a93b276936cfe411f34347165ab
-
SHA512
69fe139c05ac7efe5236fc48347b1356429c613a176acc051c50c2a3a1118d67f335abc091c1baa31dde445d9c91efca191118cd3b2b5288f4da67745b6452c0
-
SSDEEP
24576:v0784ZPsCsjb9C0Yynd+EHssgFuFYSmy:vC84VszC0RnUwFYSn
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2