General

  • Target

    e9cc9e8addc05d7d1d1b558e8e99356ba4e267217eab2c86d49ab40aa7d1c85e.exe

  • Size

    1.1MB

  • Sample

    241009-kseylavfne

  • MD5

    dc89b257e4dbe970fc2808db59eedc5b

  • SHA1

    70d81bcb40cbccc9ae5fb45682ef2525bb2f7c9f

  • SHA256

    e9cc9e8addc05d7d1d1b558e8e99356ba4e267217eab2c86d49ab40aa7d1c85e

  • SHA512

    74c753dd7fff6b9b779c6f280f9f356d2130c13b9082f1c95bdc86186b64509cf948c982235b883c7c089a23acee572d6cbe1b68c2ea0aa8fe0fec991be24194

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaCNxbAlU4l87aq7+uB3iLENiaZBPp:7JZoQrbTFZY1iaCNxl/7quBS+iaZH

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.plastikgogic.rs
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    martINAMng22320in

Extracted

Family

vipkeylogger

Targets

    • Target

      e9cc9e8addc05d7d1d1b558e8e99356ba4e267217eab2c86d49ab40aa7d1c85e.exe

    • Size

      1.1MB

    • MD5

      dc89b257e4dbe970fc2808db59eedc5b

    • SHA1

      70d81bcb40cbccc9ae5fb45682ef2525bb2f7c9f

    • SHA256

      e9cc9e8addc05d7d1d1b558e8e99356ba4e267217eab2c86d49ab40aa7d1c85e

    • SHA512

      74c753dd7fff6b9b779c6f280f9f356d2130c13b9082f1c95bdc86186b64509cf948c982235b883c7c089a23acee572d6cbe1b68c2ea0aa8fe0fec991be24194

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCNxbAlU4l87aq7+uB3iLENiaZBPp:7JZoQrbTFZY1iaCNxl/7quBS+iaZH

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks