General

  • Target

    eb63d3d88459c389d3bbf1e307d8a5e40d8ac30c4e9f8b03150e2d4c250896e8

  • Size

    802KB

  • Sample

    241009-mdys9sygll

  • MD5

    14ed33e066dd06f67f6890c5253a6d00

  • SHA1

    b3fe5ea7789b82a37a23237dd323ab5ab724d9fb

  • SHA256

    eb63d3d88459c389d3bbf1e307d8a5e40d8ac30c4e9f8b03150e2d4c250896e8

  • SHA512

    3a3bd3469985f593881b7846e94a7106135a44595410f9e50af3ee71b1d287b1b11b590f97a720f1c8fdf252ae2b4d5936bba93f12ef34122b9b6ba86a2ff713

  • SSDEEP

    24576:YVTcsrgw7l34QD+rjndm1j1LO191KMiV6X97W2Gnm3Tw29:YVcOgqBK+O19LiV6tS2Gnm3TH9

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.terrazza.hr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Vodenjak123!

Targets

    • Target

      eb63d3d88459c389d3bbf1e307d8a5e40d8ac30c4e9f8b03150e2d4c250896e8

    • Size

      802KB

    • MD5

      14ed33e066dd06f67f6890c5253a6d00

    • SHA1

      b3fe5ea7789b82a37a23237dd323ab5ab724d9fb

    • SHA256

      eb63d3d88459c389d3bbf1e307d8a5e40d8ac30c4e9f8b03150e2d4c250896e8

    • SHA512

      3a3bd3469985f593881b7846e94a7106135a44595410f9e50af3ee71b1d287b1b11b590f97a720f1c8fdf252ae2b4d5936bba93f12ef34122b9b6ba86a2ff713

    • SSDEEP

      24576:YVTcsrgw7l34QD+rjndm1j1LO191KMiV6X97W2Gnm3Tw29:YVcOgqBK+O19LiV6tS2Gnm3TH9

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks