General
-
Target
BL-COPY.zip
-
Size
784KB
-
Sample
250328-qlgrhaykt9
-
MD5
f2c511e5eebf478e3e8b7f95deff8c06
-
SHA1
a78a85341afff4683070689b93db06d786d51d82
-
SHA256
62a3ec5ea4d5c9942a989113a3e144426bfa3fa61482ecb2e727f4a788b1043e
-
SHA512
716cd557268e818a5b4b7acd9a6c406db1c1aa9b1fae2ee90f93381ee5e5a91c377a44f55c27e4f361470f10144b12be99785a0fe7523bff823d1d3473134caf
-
SSDEEP
24576:QcFAdlLJf3/4sCh3DY9uA6aqyhJw741/fsIYIeWjj:VAjhfCVDqLwCYIl/
Static task
static1
Behavioral task
behavioral1
Sample
bEXN0tpyU41jdD0.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
bEXN0tpyU41jdD0.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.steadfastlogistics.in - Port:
587 - Username:
[email protected] - Password:
slf@2023 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.steadfastlogistics.in - Port:
587 - Username:
[email protected] - Password:
slf@2023
Targets
-
-
Target
bEXN0tpyU41jdD0.exe
-
Size
864KB
-
MD5
25b7cb7a62555ef3aaa7ecae00c8decd
-
SHA1
a2421f5e2ae3aa20b8d11fc3076cea2400c68299
-
SHA256
867af082ab5f5e7468aab5bca97063c60877f44c2d39c0ad02f1a1e721c92260
-
SHA512
c7c7eeed71df83807cf9d584ee913e4661ccd7d921139a381ce4c17479420683f5ece7aa37b618d4162f39bde11c3bb2bf44fe906e9794f7d3ae0faa6c119f1b
-
SSDEEP
24576:pg5n6cf13/iyC9LDY9uAKwOy39S741VxsUYI2f:pgB6KRCxDitSiYIU
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-