General

  • Target

    f0c0c45087d04e89a5c6d449a4e7335fe8a17a73032706c6e993832f5297c8c6.img

  • Size

    1.5MB

  • Sample

    241114-dt4j1stjaz

  • MD5

    a16b17b1fc21262a59c625afe30f8a7c

  • SHA1

    21e1d15a7eae79ad61fc901eae7df1e3502b6175

  • SHA256

    f0c0c45087d04e89a5c6d449a4e7335fe8a17a73032706c6e993832f5297c8c6

  • SHA512

    8e05648a768de91fa84afff7ba2fc5825aabcd7d711a4ae5a78cd41faa83fc2612c62a794696d21bbe4cb4367faa9f9ecbe3c7f1537b7a1a46c62e6d7d8c3d43

  • SSDEEP

    24576:rtb20pkaCqT5TBWgNQ7adQpP6EpmbTnXm6A:oVg5tQ7adQpBpmPW5

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Platba_12112024,jpg.exe

    • Size

      985KB

    • MD5

      c283f7231f0afe8e36105ac96d659f9f

    • SHA1

      2b176959f9268fe80f172f04e4f2492ba568d709

    • SHA256

      681fef105d5d7be701a4057aace3dbb1df5d8667b25545d4456fb7f72f37b4ae

    • SHA512

      72662ee410f4830c1c10f40baa381639b1088b81d6280e03a8acd2019376315868af14fcd91d33c7174bfc9ed2604de512ddfbec8ccd8e41831ada4b10fdf1be

    • SSDEEP

      24576:etb20pkaCqT5TBWgNQ7adQpP6EpmbTnXm6A:LVg5tQ7adQpBpmPW5

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks