General

  • Target

    OCSJI_483b1021e47bc5859b82729706c94f90b69fed0ee365030566a341e6333a3d39

  • Size

    1.2MB

  • Sample

    241117-k17zcavrgx

  • MD5

    2c843f2d59e0ec42f32f545c55012795

  • SHA1

    7cab8aeb6a85ef29378a63a1581fed53c9ec79df

  • SHA256

    483b1021e47bc5859b82729706c94f90b69fed0ee365030566a341e6333a3d39

  • SHA512

    e79e5f769a3f0529127e35b70b4dde17b0f847bb201545ea4554e7b0fd232177b01ddc42ada40ad3c56ec096a2f841a4d582da508eebd9dd0c72b32ef226dafe

  • SSDEEP

    24576:tfmMv6Ckr7Mny5QsQNgtGczs5bKUM6NZcxkAZJIQI:t3v+7/5QsMDcQ5WsoPFI

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.singhalenterprise.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    balkishan@123

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      OCSJI_483b1021e47bc5859b82729706c94f90b69fed0ee365030566a341e6333a3d39

    • Size

      1.2MB

    • MD5

      2c843f2d59e0ec42f32f545c55012795

    • SHA1

      7cab8aeb6a85ef29378a63a1581fed53c9ec79df

    • SHA256

      483b1021e47bc5859b82729706c94f90b69fed0ee365030566a341e6333a3d39

    • SHA512

      e79e5f769a3f0529127e35b70b4dde17b0f847bb201545ea4554e7b0fd232177b01ddc42ada40ad3c56ec096a2f841a4d582da508eebd9dd0c72b32ef226dafe

    • SSDEEP

      24576:tfmMv6Ckr7Mny5QsQNgtGczs5bKUM6NZcxkAZJIQI:t3v+7/5QsMDcQ5WsoPFI

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks