General

  • Target

    c123a4fd5ba24020a1bd9bbba902fb3c2d5ef762179f0ebc80162fe3fa688157.exe

  • Size

    1.2MB

  • Sample

    241009-cq3ymstbpr

  • MD5

    c6ea3307e9a65e875771de10447a16d8

  • SHA1

    5017b674c445aee1da090dea0f721794ec0c5935

  • SHA256

    c123a4fd5ba24020a1bd9bbba902fb3c2d5ef762179f0ebc80162fe3fa688157

  • SHA512

    77c6fac0419705fd33e203c67310a4c5d5ef1d50ac328a5762f52fa8700962ccba91fbadf00d201fea521f04ff2253a42269d63daa807b222a1d259a5796a479

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaC63CsrjvJ32YgcniuY9vln:7JZoQrbTFZY1iaC3svvJmd3Xvln

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.osconsupplies.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Fin#OSCn@2k2

Extracted

Family

vipkeylogger

Targets

    • Target

      c123a4fd5ba24020a1bd9bbba902fb3c2d5ef762179f0ebc80162fe3fa688157.exe

    • Size

      1.2MB

    • MD5

      c6ea3307e9a65e875771de10447a16d8

    • SHA1

      5017b674c445aee1da090dea0f721794ec0c5935

    • SHA256

      c123a4fd5ba24020a1bd9bbba902fb3c2d5ef762179f0ebc80162fe3fa688157

    • SHA512

      77c6fac0419705fd33e203c67310a4c5d5ef1d50ac328a5762f52fa8700962ccba91fbadf00d201fea521f04ff2253a42269d63daa807b222a1d259a5796a479

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaC63CsrjvJ32YgcniuY9vln:7JZoQrbTFZY1iaC3svvJmd3Xvln

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks