General

  • Target

    SOLICITUD URGENTE RFQ-05567.exe

  • Size

    1.2MB

  • Sample

    241025-rnfsna1brf

  • MD5

    9012193edf2bb4babb0cac26a33cf304

  • SHA1

    febd1e9f58df8d366b61ad3c1895e8d76fdff736

  • SHA256

    6545bbb96495a8772c5f6d6c5e0c202e05153002d37b7d27580216b4605c67f7

  • SHA512

    69f3124501e3978f54807bd28e5fe4eb456b61735aee90ba76fca3355037a54941cf321ab398c519ed65937969433df8e41541be78cb454c825140c2746c3cef

  • SSDEEP

    24576:tfmMv6Ckr7Mny5QZl29nU3jQiFSG69xNxG1j552NZ:t3v+7/5QZl2RUsiFyxbZ

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.singhalenterprise.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    balkishan@123

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      SOLICITUD URGENTE RFQ-05567.exe

    • Size

      1.2MB

    • MD5

      9012193edf2bb4babb0cac26a33cf304

    • SHA1

      febd1e9f58df8d366b61ad3c1895e8d76fdff736

    • SHA256

      6545bbb96495a8772c5f6d6c5e0c202e05153002d37b7d27580216b4605c67f7

    • SHA512

      69f3124501e3978f54807bd28e5fe4eb456b61735aee90ba76fca3355037a54941cf321ab398c519ed65937969433df8e41541be78cb454c825140c2746c3cef

    • SSDEEP

      24576:tfmMv6Ckr7Mny5QZl29nU3jQiFSG69xNxG1j552NZ:t3v+7/5QZl2RUsiFyxbZ

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks