Resubmissions

21-09-2024 19:32

240921-x817zsygpg 10

21-09-2024 11:47

240921-nxv26azhng 10

General

  • Target

    Order.zip

  • Size

    477KB

  • Sample

    240921-nxv26azhng

  • MD5

    2d98061820e074b3c289815996a38443

  • SHA1

    f6ce537a7f31ed9509d2b22f2406cb01f227a69a

  • SHA256

    e4d8394f74053ae9e12309994170e177ec8bd01e756d6b327d88efee7d3bf924

  • SHA512

    1ce0f58cd35508f78646e282a4257457602dc6c454ab0ab3ce374854263fff94d1f3da849e6ecad3dfdd6807d7cecb832e8030f785184b3dc0b767cef461ba39

  • SSDEEP

    12288:gekIy66nl89Os8Tr6nD/RtqygtWeZ+NTaTe2:g4ilyUrO/jqyYIeTj

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7985888771:AAEHZkJS7VPCqlc0_wV-hgnkJ-IvnEmNisQ/sendMessage?chat_id=2135869667

Targets

    • Target

      Order.exe

    • Size

      888KB

    • MD5

      d6967ea7baf752e952a2c8c184feef3b

    • SHA1

      fb9f42d5792c1e3de2655e170c45ed480aacb3e3

    • SHA256

      e40aa2ac74b12d2b000617839127a60a5faa81d7cae5087b738ba2b45c040537

    • SHA512

      ddaeae2bbe990c89713b7a1b5b272b75f010b3106f88fc64b81b94d520811567c70d91c1d02e8f5b7383eded48a6c928a213afb62ed414c47395903c0942edfe

    • SSDEEP

      12288:TvSqYOE58ExJ78cdJZDO14zXVwmaHLXV2xNgC8BtnpHKWULHaesE1gqd1tw/:O6OCcdJZDO14zXVwmaH7IxABTXedFy

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks