General

  • Target

    0bdcef1bfa0aaab36d678b6615963b6a1f536cfb2216c6d76186476375c05e8c

  • Size

    9KB

  • Sample

    241104-ggpf4swarm

  • MD5

    faf7883ef485374a57cb9c18b52c033c

  • SHA1

    18aed625d32a3c3086ee992183bb13a497404a90

  • SHA256

    0bdcef1bfa0aaab36d678b6615963b6a1f536cfb2216c6d76186476375c05e8c

  • SHA512

    bc61bc451af5880f3751155dd2ddc53f31b01a237382999f71e83b28235ba4e26891db55574054dd92de254d62ad4f2abdae3b476e8a2945030a45dd1c52d06a

  • SSDEEP

    192:hbhxBZoB0vn89F8J8zUcCCZ3ZXIYvw6/JpZ0KWOPMMSQp3bru42KihPUUjNngSR0:hbXBZouvOAwZpX9V3eELEtsCnXR0

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.jacopopacchioni.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Ct2mZ=B-7tCC2019

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Request for Quotation_MYMRT.vbs

    • Size

      33KB

    • MD5

      f61450af7a076afae98ccd4c8d6b8184

    • SHA1

      4fa061cf9880257caaf3208f4963df4461a3cb56

    • SHA256

      d5d4fab81408eb3fcceeaebae060cc5d1d275139c52f17659998325fd5b7a76b

    • SHA512

      925fa6cc8e2db1c850780627610de88f612a20c5945154dcb68f603b3ea3430a68962533e310daa5d1d158e14fb0ca2ed4be2b2f5ec92e45c97a7975e750ca31

    • SSDEEP

      384:G7O2zToyVATbhB2DxCjbb89g8PhQX71nUK8g7qBfQXa:GrIyM7XfeZQLVugI

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks