General

  • Target

    2a6f4469a3529e0150fe099eec6cff195f568ded7ceeb1cfb3a60398ac3f52ba.exe

  • Size

    73KB

  • Sample

    241108-ct8cjataqq

  • MD5

    4183c23bdf7dfa0ef51e4ebe1c753766

  • SHA1

    b6074bb78d1681bfab0c7dcd1b05aa724e5fd9a9

  • SHA256

    2a6f4469a3529e0150fe099eec6cff195f568ded7ceeb1cfb3a60398ac3f52ba

  • SHA512

    db757700e79a6973baafada24bbad7b5dc6605d012eada0a1bdcc55aabf82956a955f9d905f0cfc99e9b7bdb7dbf98c2602a3cf1a979db3a4dd234113efc572f

  • SSDEEP

    768:NhpjDqQflLNiasAdpCMHDfEP12mKkq5Bq8/UlItG9m+64vl31/f8a/F5KG06E7Rv:jNziaX8Ms6kKMlI464vl3HF5KG06EB3

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    TZmaka!@Y66#W{L!IoB5..

Targets

    • Target

      2a6f4469a3529e0150fe099eec6cff195f568ded7ceeb1cfb3a60398ac3f52ba.exe

    • Size

      73KB

    • MD5

      4183c23bdf7dfa0ef51e4ebe1c753766

    • SHA1

      b6074bb78d1681bfab0c7dcd1b05aa724e5fd9a9

    • SHA256

      2a6f4469a3529e0150fe099eec6cff195f568ded7ceeb1cfb3a60398ac3f52ba

    • SHA512

      db757700e79a6973baafada24bbad7b5dc6605d012eada0a1bdcc55aabf82956a955f9d905f0cfc99e9b7bdb7dbf98c2602a3cf1a979db3a4dd234113efc572f

    • SSDEEP

      768:NhpjDqQflLNiasAdpCMHDfEP12mKkq5Bq8/UlItG9m+64vl31/f8a/F5KG06E7Rv:jNziaX8Ms6kKMlI464vl3HF5KG06EB3

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks