General

  • Target

    06ece862a8c5dae21c3dda0ccf4aa564c8a09b72f43b2cbb3258258355b66123

  • Size

    648KB

  • Sample

    240919-fpg7bssbmh

  • MD5

    a316c5dfa756f2c4a5e56c352ebdbf1f

  • SHA1

    10075c90d07b6cbec8438dcc4aa90f470fe51d97

  • SHA256

    06ece862a8c5dae21c3dda0ccf4aa564c8a09b72f43b2cbb3258258355b66123

  • SHA512

    b20a56c4347e26d193ff8a5c06294911d213649dde4dce4067e5b7c848dda08abbe8cc2aede04fca76d9378fad5fa6d4c63295f00367181840be312cef6cd96c

  • SSDEEP

    12288:i3r9UWWtpFOoR4r0KzDFwH4p5GfYmTu1jnEBAACpy3Kzf7rWAHfpmQEDbn0/:i9Wtpwek4VT2gBA1AWDrWAEQEDbn0/

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Proof Of Payment- Swift Copy.bat

    • Size

      672KB

    • MD5

      39ece2abddd8cd86565c3c4dd83a08f2

    • SHA1

      0b605de9bbda10d8d70759812ec2e90ba128e7a6

    • SHA256

      b147b7f7e30fe740ba8adb0c1b376b5df25a27b59275a41c872f1ee0956415f2

    • SHA512

      5cabb9bea16ff13577cb65ce55d85c561af28396055134c33af5b5fc258381cdf93e0072c1dee1179247fdff8c488e350cf83dbc41e25f6ba1bef8eebaa6cc54

    • SSDEEP

      12288:qr9UEWtpNOoR4XiqzD5634pVGf0mT+x31ETqA+163KzfVrWAhn7aQGNDT9I:UWtpI4SMZTguTq9oWNrWomQGNDm

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks