General

  • Target

    2544c1b36ef1f8bb0400a83f1356a45b0976e7cf9b25941f0cbb872dbb5ba7df.exe

  • Size

    801KB

  • Sample

    241023-bjbp5svgqp

  • MD5

    fe3516d3244e305018a3414aade1c8d1

  • SHA1

    2a87e9f1c2ee4105b634f6d4d36e132c977e6329

  • SHA256

    2544c1b36ef1f8bb0400a83f1356a45b0976e7cf9b25941f0cbb872dbb5ba7df

  • SHA512

    a917bce56d930ade5c0ca14f9f402166f9442611e8d987ea5ccff4226042e9408718816c6f492964f39fb2d35f74e929b2f799ad2220a3e5e39916159dee5066

  • SSDEEP

    24576:0YJW0QyhwMhiv2UqBZisBkPvusnvrUmHn:JZwMhiuDBWWsb

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.alamodigroup.com.qa
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Ah#@12345@@med

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      2544c1b36ef1f8bb0400a83f1356a45b0976e7cf9b25941f0cbb872dbb5ba7df.exe

    • Size

      801KB

    • MD5

      fe3516d3244e305018a3414aade1c8d1

    • SHA1

      2a87e9f1c2ee4105b634f6d4d36e132c977e6329

    • SHA256

      2544c1b36ef1f8bb0400a83f1356a45b0976e7cf9b25941f0cbb872dbb5ba7df

    • SHA512

      a917bce56d930ade5c0ca14f9f402166f9442611e8d987ea5ccff4226042e9408718816c6f492964f39fb2d35f74e929b2f799ad2220a3e5e39916159dee5066

    • SSDEEP

      24576:0YJW0QyhwMhiv2UqBZisBkPvusnvrUmHn:JZwMhiuDBWWsb

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks