General
-
Target
PO 8620801 .pdf.exe
-
Size
892KB
-
Sample
250414-k3wzvstlt3
-
MD5
60d3c0ba8ba14dc2070d16baf18a1986
-
SHA1
244244ab1ebda098d7792eaea063cbad5fb16945
-
SHA256
77b6742a4beccef32d22a13aa555eb35537265ecc3662f845d48a86dc126c875
-
SHA512
d3304af1f4e3cc82fa4caa56e100f27efe1276a93697dc5a74ec6e540c3a9a44b1fde5c4ce7e798a1de1b89c88bd6c950f5b397becdf5aa6d476cb7b08263aa6
-
SSDEEP
12288:Uoi6cfy84PI96XOnna8NymofY/6ZPcnrVGh06v75VZbuOY78cXrzzfdWsYYT:Xi6cWwYsYmoYTrVyl7buOW3zlnf
Static task
static1
Behavioral task
behavioral1
Sample
PO 8620801 .pdf.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.puyehuechile.cl - Port:
587 - Username:
[email protected] - Password:
Daem2024.
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.puyehuechile.cl - Port:
587 - Username:
[email protected] - Password:
Daem2024. - Email To:
[email protected]
https://api.telegram.org/bot7734343353:AAEmQvfIoOWaFhz75a3JZ6hyXwpiKyq7nnY/sendMessage?chat_id=7049826127
Targets
-
-
Target
PO 8620801 .pdf.exe
-
Size
892KB
-
MD5
60d3c0ba8ba14dc2070d16baf18a1986
-
SHA1
244244ab1ebda098d7792eaea063cbad5fb16945
-
SHA256
77b6742a4beccef32d22a13aa555eb35537265ecc3662f845d48a86dc126c875
-
SHA512
d3304af1f4e3cc82fa4caa56e100f27efe1276a93697dc5a74ec6e540c3a9a44b1fde5c4ce7e798a1de1b89c88bd6c950f5b397becdf5aa6d476cb7b08263aa6
-
SSDEEP
12288:Uoi6cfy84PI96XOnna8NymofY/6ZPcnrVGh06v75VZbuOY78cXrzzfdWsYYT:Xi6cWwYsYmoYTrVyl7buOW3zlnf
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2