Resubmissions
19-11-2024 17:07
241119-vmytmaykfx 10General
-
Target
Xkl0PnD8zFPjfh1.wiz.rtf
-
Size
408KB
-
Sample
241119-vmytmaykfx
-
MD5
f6e89e6c3ab17d8d58699ccefeaf3c8d
-
SHA1
86c245d0a2ef138aa7afca6bb43316e251b07c68
-
SHA256
32f5bf26d32b42212ada3e88017ad037c6c84f760a64585252576d893a00ff5f
-
SHA512
ab3a82dcd600c7169da373101593480a1ef8e82b2d339b5367f0e2b118f23ec3eb591a3e269de3f5d8b0e0843ec4574b33c5f98e0344c4be38a26c25caccb4b6
-
SSDEEP
3072:wwAlawAlawAlawAlawAlawAlawAlawAltU8xX2iqwq3QS:wwAYwAYwAYwAYwAYwAYwAYwA3dTqAS
Static task
static1
Behavioral task
behavioral1
Sample
Xkl0PnD8zFPjfh1.wiz.rtf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Xkl0PnD8zFPjfh1.wiz.rtf
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.covid19support.top - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Targets
-
-
Target
Xkl0PnD8zFPjfh1.wiz.rtf
-
Size
408KB
-
MD5
f6e89e6c3ab17d8d58699ccefeaf3c8d
-
SHA1
86c245d0a2ef138aa7afca6bb43316e251b07c68
-
SHA256
32f5bf26d32b42212ada3e88017ad037c6c84f760a64585252576d893a00ff5f
-
SHA512
ab3a82dcd600c7169da373101593480a1ef8e82b2d339b5367f0e2b118f23ec3eb591a3e269de3f5d8b0e0843ec4574b33c5f98e0344c4be38a26c25caccb4b6
-
SSDEEP
3072:wwAlawAlawAlawAlawAlawAlawAlawAltU8xX2iqwq3QS:wwAYwAYwAYwAYwAYwAYwAYwA3dTqAS
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Exploitation for Client Execution
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2