General

  • Target

    966a8f150c31bd1b700f96cd44bc909fd39e51a5d385b9a177b15a83321ed837N

  • Size

    865KB

  • Sample

    240928-e48r6axbqj

  • MD5

    c874eb4a93fa59bfd27504796965d740

  • SHA1

    0405b2e7c3aca558d1bb8f3243d7068e33f78cf0

  • SHA256

    966a8f150c31bd1b700f96cd44bc909fd39e51a5d385b9a177b15a83321ed837

  • SHA512

    87a63c76237e898e8e9db5c3c7f207e2d6eb053762438151f1904966b85ba2659814465ad17d37c7610e5ff1c0a7e2bbac630ab3fd1a930bcbc8fbdea468578d

  • SSDEEP

    12288:N8QbrixlarzCKt97Q6KPBAZlp2VOVbqNKljndAyRL+q8mW4AFoWxTN8xH2qwgSUb:NLixlarzCW9E5PB/VOxqayAWNNcGgVb

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.boschservice.com.tr
  • Port:
    587
  • Username:
    simgeoto@boschservice.com.tr
  • Password:
    sim844BcS

Extracted

Family

vipkeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.boschservice.com.tr
  • Port:
    587
  • Username:
    simgeoto@boschservice.com.tr
  • Password:
    sim844BcS
  • Email To:
    shirleybwn247@gmail.com

Targets

    • Target

      966a8f150c31bd1b700f96cd44bc909fd39e51a5d385b9a177b15a83321ed837N

    • Size

      865KB

    • MD5

      c874eb4a93fa59bfd27504796965d740

    • SHA1

      0405b2e7c3aca558d1bb8f3243d7068e33f78cf0

    • SHA256

      966a8f150c31bd1b700f96cd44bc909fd39e51a5d385b9a177b15a83321ed837

    • SHA512

      87a63c76237e898e8e9db5c3c7f207e2d6eb053762438151f1904966b85ba2659814465ad17d37c7610e5ff1c0a7e2bbac630ab3fd1a930bcbc8fbdea468578d

    • SSDEEP

      12288:N8QbrixlarzCKt97Q6KPBAZlp2VOVbqNKljndAyRL+q8mW4AFoWxTN8xH2qwgSUb:NLixlarzCW9E5PB/VOxqayAWNNcGgVb

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.