General
-
Target
PO-94858.exe
-
Size
876KB
-
Sample
241017-pf13hsxajh
-
MD5
efeb7d261da3f778abf002c69a971eb8
-
SHA1
f4e570bf56015da2c76faac8dc8f28a7e3a3d8a3
-
SHA256
cf2afee6c1871706deb922c7105c9e5bf6a2bbaca312b1b4ec4951dcfa033ea7
-
SHA512
5cbcd6b9b06f63019e9c00e47e4bee071079e81792ea8cd6173d4f544c15b852090f38e3a642dbc51dd357068634a4b769098204f9f409119a3675eb4d98487e
-
SSDEEP
24576:sw5i21T5xhInKT/Y2ol8tdi817TWdg0F7RR:sV017TWSyR
Static task
static1
Behavioral task
behavioral1
Sample
PO-94858.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
PO-94858.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
hosting1.ro.hostsailor.com - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Targets
-
-
Target
PO-94858.exe
-
Size
876KB
-
MD5
efeb7d261da3f778abf002c69a971eb8
-
SHA1
f4e570bf56015da2c76faac8dc8f28a7e3a3d8a3
-
SHA256
cf2afee6c1871706deb922c7105c9e5bf6a2bbaca312b1b4ec4951dcfa033ea7
-
SHA512
5cbcd6b9b06f63019e9c00e47e4bee071079e81792ea8cd6173d4f544c15b852090f38e3a642dbc51dd357068634a4b769098204f9f409119a3675eb4d98487e
-
SSDEEP
24576:sw5i21T5xhInKT/Y2ol8tdi817TWdg0F7RR:sV017TWSyR
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
4d3b19a81bd51f8ce44b93643a4e3a99
-
SHA1
35f8b00e85577b014080df98bd2c378351d9b3e9
-
SHA256
fda0018ab182ac6025d2fc9a2efcce3745d1da21ce5141859f8286cf319a52ce
-
SHA512
b2ba9c961c0e1617f802990587a9000979ab5cc493ae2f8ca852eb43eeaf24916b0b29057dbff7d41a1797dfb2dce3db41990e8639b8f205771dbec3fd80f622
-
SSDEEP
192:BPtkumJX7zB22kGwfy0mtVgkCPOse1un:u702k5qpdseQn
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2