General
-
Target
Payment Copy.docx
-
Size
459KB
-
Sample
241113-hn5bkszqel
-
MD5
461b9e11fc472678391ea0896131e3fd
-
SHA1
1d5d856bd620c7ed772701f848ae53124d2bfbdd
-
SHA256
e2eec3fead32a394e15dc805efb549f453b3020cde2e37f6d36020b0297d0d4d
-
SHA512
6bb127c496c6e01c1b86fc4a88cd26ca4f173be414494d58dbca921de660f9f6b3368d86c7fb224e22865908377060df574573c91944d1c526040437e13cec00
-
SSDEEP
6144:A6lcbR5HastSFXbqUAbqUAbqUvyLE8IIIIIW0ru0rqme6eeCe9vCeXhdA99tmYL/:ZARtUVhpr/rqIXQ9mrm9Bt2mhW8G0Y4
Static task
static1
Behavioral task
behavioral1
Sample
Payment Copy.docx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payment Copy.docx
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.jhxkgroup.online - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Targets
-
-
Target
Payment Copy.docx
-
Size
459KB
-
MD5
461b9e11fc472678391ea0896131e3fd
-
SHA1
1d5d856bd620c7ed772701f848ae53124d2bfbdd
-
SHA256
e2eec3fead32a394e15dc805efb549f453b3020cde2e37f6d36020b0297d0d4d
-
SHA512
6bb127c496c6e01c1b86fc4a88cd26ca4f173be414494d58dbca921de660f9f6b3368d86c7fb224e22865908377060df574573c91944d1c526040437e13cec00
-
SSDEEP
6144:A6lcbR5HastSFXbqUAbqUAbqUvyLE8IIIIIW0ru0rqme6eeCe9vCeXhdA99tmYL/:ZARtUVhpr/rqIXQ9mrm9Bt2mhW8G0Y4
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Abuses OpenXML format to download file from external location
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Exploitation for Client Execution
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2