General

  • Target

    6c68fda322195cbe8adc1bfb3e111555300ce387dd3bc59236c5f7b6d18a4b1e.exe

  • Size

    1.2MB

  • Sample

    241105-sxglzssra1

  • MD5

    2a2555304ebd2fa0755a6831080259df

  • SHA1

    bf63f44fd3ddf40b91f9dad3c68f3c8a057806ec

  • SHA256

    6c68fda322195cbe8adc1bfb3e111555300ce387dd3bc59236c5f7b6d18a4b1e

  • SHA512

    d03e74ebf880260ad4b8f6f1d95e02fc7ee73a96fba758723176a5f20590cb3d004c503b493a26bfc03cb421a3c22ca7bbee3d6a53ea927898fb1dcb245c417f

  • SSDEEP

    24576:ffmMv6Ckr7Mny5QLiKpEgA0YA8kpztWcY:f3v+7/5QLi3gA0YAVW

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ujexchange.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    UJ@2022

Targets

    • Target

      6c68fda322195cbe8adc1bfb3e111555300ce387dd3bc59236c5f7b6d18a4b1e.exe

    • Size

      1.2MB

    • MD5

      2a2555304ebd2fa0755a6831080259df

    • SHA1

      bf63f44fd3ddf40b91f9dad3c68f3c8a057806ec

    • SHA256

      6c68fda322195cbe8adc1bfb3e111555300ce387dd3bc59236c5f7b6d18a4b1e

    • SHA512

      d03e74ebf880260ad4b8f6f1d95e02fc7ee73a96fba758723176a5f20590cb3d004c503b493a26bfc03cb421a3c22ca7bbee3d6a53ea927898fb1dcb245c417f

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLiKpEgA0YA8kpztWcY:f3v+7/5QLi3gA0YAVW

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks