General

  • Target

    19872489267.zip

  • Size

    634KB

  • Sample

    241112-fj37lswakl

  • MD5

    21e785889fef45774e5f8b58dbb2e92e

  • SHA1

    af02835794573066fb821042f7ccba472f82ae15

  • SHA256

    039dccbeb649a2341aeae200d3dd6ddb0cb1f585e20a6dce324e0409a8a1bb6a

  • SHA512

    b6a73316eaf5566acfea8ba2b90d10ac8e8382da1057e75e317ebcfa5a768b8238fad05a820ebb4e7d79d849fb16c19e5f7f91229a97deaf87b969b49bbd8640

  • SSDEEP

    12288:YpMWZeqONHqApUyjYXXFFdLcF8vcRTtvhRLV/v:zW0bNPU0YXXxcFHRvrLV

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.alamodigroup.com.qa
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Ah#@12345@@med

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      9d64a20e0c71ad132706add58a0f8247737500e6f861365214febd9daaadea30

    • Size

      645KB

    • MD5

      778160556d73427cd6ba266bbbb8dbdb

    • SHA1

      6cad2f8457fc08e1c08d22b9860fe456d3b8cce7

    • SHA256

      9d64a20e0c71ad132706add58a0f8247737500e6f861365214febd9daaadea30

    • SHA512

      4bb9aef2b964c0ec0821b8ac5756c97b61580276bf7ef1e6279852aba824602c6569e76018e46d07c30c82c57b864c49933dffb555225eb231571eba0c6c0dd5

    • SSDEEP

      12288:kTUSBLQexTnafOU/2Gjmld3mLkSJJmNYMQvE33A/k6ZeeQVmOVPts:kTBnTVzGjm3ikMJRbk6PQV/ts

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks