General

  • Target

    13112024_1909_12112024_Factura nºB-2542.rar

  • Size

    408KB

  • Sample

    241113-xtrp1axjft

  • MD5

    bc715ededa2a16fab93d7b7b77ee4f84

  • SHA1

    9d2a7275c6622f4b3e21de97e9f0bf3dee017948

  • SHA256

    bbf5b53da86f327f242fb550cbb6efa7aaf5a465f580e50443dae83252e931b6

  • SHA512

    c4f74c8f1d97475561bf6a467e32394b32bf254ccf43cffacbeee3629ddad72699043c7201ddc81e32f2695b34514ae8c2bd2f8ef03d51564a64cbfb050d041f

  • SSDEEP

    6144:yhWvSvq/+IT2vya6n1zFbKVPVa+6N7egc6uRVV8Cg1QsPzDorbpL3O2CK+SXoXUM:3N+8OVPVwVLc6AVjS4I3SeU8ptZ

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Factura nºB-2542.exe

    • Size

      756KB

    • MD5

      b9e133e3f5e083f026c072086b882fcb

    • SHA1

      a731da15a426dd88896925bf24d63326a4c4a111

    • SHA256

      8a200d76ee514afb1f98399c12bdd0f03fd9f75cbbaff97c67085c6eacbc7ea2

    • SHA512

      300ad4a6a2d53a16d0b946fe2ae1485ac9f45537b0faa394126d304a5b749f7869b416ef56b9361f03546de2bb0962955968191e0ce777a3526de0454bd808b9

    • SSDEEP

      12288:Y2+nSPz5ZA/EME8j5i5jgRufqrr/raUO86cO2jjAQSEcN/rHFu4:ioz5W/EJHj0EGjSEcu4

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks