General

  • Target

    C0R99012T83633196.eml

  • Size

    205KB

  • Sample

    240823-vdh2tawekf

  • MD5

    82c89feeafba2f9d1681198ac3888e3a

  • SHA1

    92f40d5d596f7de2579153be44661686cb539a38

  • SHA256

    eac9eb05b0d84224119fb275b0e87a79a3df635ff2beff4e18014fb0b48dc512

  • SHA512

    1481864a7403891c3fb8ac959fbf4eca0ea1e65f98c8407b33121a354b30673dac2ddd444f31f581e4a5ed37403a3ead6b56602d23f2831a9e7349d6efa5c344

  • SSDEEP

    3072:neusqIqgDr9Bgt9u2a5ol9nY+42m52GbVF97H6k2o:nJIqg1Bgt95vHnYlAGbVN

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      FedEx AWB 000263577955.exe

    • Size

      270KB

    • MD5

      cfc120bf407819279cf397b82349f981

    • SHA1

      02a48aa73c673adb1e0f7853a2134621915c20da

    • SHA256

      b8d723a1c3a3fd42eebbf246571cf7704bc34001cf1a7599b0e2838957537140

    • SHA512

      c8910a24f0ea386847824994537a8216238abac73ec242a2588d3f93a45681e86626781afa203799d7769b3d791273cca6242267d23510833f6c1a32f2246f72

    • SSDEEP

      3072:lRaT7BpxrdPlRH/Pc3ctX9eymsjK5aBlTpHOKpSUYmyG5EMbfPG4s0PUYTVg4i4g:8e3slTsUVyGlbnGGzb

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks