General

  • Target

    986a7af99dae4669a8d396f33ec71a3dce83f49902481d65489078d32c8aedee.exe

  • Size

    827KB

  • Sample

    241011-maabhasflk

  • MD5

    bd22643b99f43bba3a8879e31769104f

  • SHA1

    9cda02098e71ac53e3c9952d08b6f084f2162f5b

  • SHA256

    986a7af99dae4669a8d396f33ec71a3dce83f49902481d65489078d32c8aedee

  • SHA512

    672f789f1cd6b67721a20763ec0b7c27a9b2280e9f1407d3ba675c41b2d52bf3b818f6c4fbfe97e5152080a6665ab92a262003e008aa2279c325ab39a8e4efd7

  • SSDEEP

    24576:NVTcsrgw7y6ry23mjDVWhRcgBS7W2Gnm3Tw2L:NVcOgv22/uR3cS2Gnm3THL

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.terrazza.hr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Vodenjak123!

Targets

    • Target

      986a7af99dae4669a8d396f33ec71a3dce83f49902481d65489078d32c8aedee.exe

    • Size

      827KB

    • MD5

      bd22643b99f43bba3a8879e31769104f

    • SHA1

      9cda02098e71ac53e3c9952d08b6f084f2162f5b

    • SHA256

      986a7af99dae4669a8d396f33ec71a3dce83f49902481d65489078d32c8aedee

    • SHA512

      672f789f1cd6b67721a20763ec0b7c27a9b2280e9f1407d3ba675c41b2d52bf3b818f6c4fbfe97e5152080a6665ab92a262003e008aa2279c325ab39a8e4efd7

    • SSDEEP

      24576:NVTcsrgw7y6ry23mjDVWhRcgBS7W2Gnm3Tw2L:NVcOgv22/uR3cS2Gnm3THL

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks