General

  • Target

    e3916cd3137d03d94e2bf23858bb61ca77e444540d78209e47dff384cf6f6846

  • Size

    1.2MB

  • Sample

    241113-x5s27sybln

  • MD5

    83592b7702432037e030e62457f93d74

  • SHA1

    1d8ee96ec41ffb7558015e8c844e11223e23ad7c

  • SHA256

    e3916cd3137d03d94e2bf23858bb61ca77e444540d78209e47dff384cf6f6846

  • SHA512

    1fdb48deb4d7df289f19c8bde6014ec8a31a2a9932f357e4c28cc2d631db504214ba3d4964d18677507343438b5058d80dfa42f1a42cfe577c8a3a45cfcfc990

  • SSDEEP

    24576:tfmMv6Ckr7Mny5QZ4qKxHT/mAnQR+TxALLdZnZ:t3v+7/5QZfKpmz+iLLvZ

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.minhlamcons.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @Tran@123456

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      e3916cd3137d03d94e2bf23858bb61ca77e444540d78209e47dff384cf6f6846

    • Size

      1.2MB

    • MD5

      83592b7702432037e030e62457f93d74

    • SHA1

      1d8ee96ec41ffb7558015e8c844e11223e23ad7c

    • SHA256

      e3916cd3137d03d94e2bf23858bb61ca77e444540d78209e47dff384cf6f6846

    • SHA512

      1fdb48deb4d7df289f19c8bde6014ec8a31a2a9932f357e4c28cc2d631db504214ba3d4964d18677507343438b5058d80dfa42f1a42cfe577c8a3a45cfcfc990

    • SSDEEP

      24576:tfmMv6Ckr7Mny5QZ4qKxHT/mAnQR+TxALLdZnZ:t3v+7/5QZfKpmz+iLLvZ

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks