General

  • Target

    4a4ba7d3ee33b946c726769f6251c1adb4bfd6bc90e679ea3ae394c9117174ca.exe

  • Size

    817KB

  • Sample

    241119-ezk6as1cnk

  • MD5

    907268cbf218e72fadc5518e995cd724

  • SHA1

    7e44655044d4af5100617ac497a1c53171976258

  • SHA256

    4a4ba7d3ee33b946c726769f6251c1adb4bfd6bc90e679ea3ae394c9117174ca

  • SHA512

    e395e09c9050ca962988edac1ad521c157ac16b0b5bb8720795d5acbdd40345acfaf9ec41cf60f67c402089642023f849bab6e2fd8964fcd8ecfcb435fe7d33f

  • SSDEEP

    24576:jRmJkcoQricOIQxiZY1iaxbUa7DZkRtJxx2h:QJZoQrbTFZY1iaxw0DZknJxO

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ksp-ljutomer.si
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    zQVxG9sSH7R3

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      4a4ba7d3ee33b946c726769f6251c1adb4bfd6bc90e679ea3ae394c9117174ca.exe

    • Size

      817KB

    • MD5

      907268cbf218e72fadc5518e995cd724

    • SHA1

      7e44655044d4af5100617ac497a1c53171976258

    • SHA256

      4a4ba7d3ee33b946c726769f6251c1adb4bfd6bc90e679ea3ae394c9117174ca

    • SHA512

      e395e09c9050ca962988edac1ad521c157ac16b0b5bb8720795d5acbdd40345acfaf9ec41cf60f67c402089642023f849bab6e2fd8964fcd8ecfcb435fe7d33f

    • SSDEEP

      24576:jRmJkcoQricOIQxiZY1iaxbUa7DZkRtJxx2h:QJZoQrbTFZY1iaxw0DZknJxO

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks