General

  • Target

    28801553236f9b3c3b5bac061244272e338e9108848a843fcf6a74ba3ce48037.exe

  • Size

    3.3MB

  • Sample

    241119-vvsbtatmak

  • MD5

    7d1227ee01425e0fff15834068d02af5

  • SHA1

    f01b9efaf12aabe2c9d2f173602320d8d416bd88

  • SHA256

    28801553236f9b3c3b5bac061244272e338e9108848a843fcf6a74ba3ce48037

  • SHA512

    1c9dea1619908496cd2a6feaa48f14162edb4c2f9e9b86d470aeeb8d21b6acb5d6e01420092a3b30ec4ed53eb78f5f461dc061f597d71d1caa037a4db861bbff

  • SSDEEP

    12288:BjvjM34XUe5Z20BXdHhOoaVUQqiJL2Lchnlk8lq7oIqvdkDykVHWCaDa:BjrdUOY0phAoaVUQn2LcHk8lq7oIII3P

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.singhalenterprise.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    balkishan@123

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      28801553236f9b3c3b5bac061244272e338e9108848a843fcf6a74ba3ce48037.exe

    • Size

      3.3MB

    • MD5

      7d1227ee01425e0fff15834068d02af5

    • SHA1

      f01b9efaf12aabe2c9d2f173602320d8d416bd88

    • SHA256

      28801553236f9b3c3b5bac061244272e338e9108848a843fcf6a74ba3ce48037

    • SHA512

      1c9dea1619908496cd2a6feaa48f14162edb4c2f9e9b86d470aeeb8d21b6acb5d6e01420092a3b30ec4ed53eb78f5f461dc061f597d71d1caa037a4db861bbff

    • SSDEEP

      12288:BjvjM34XUe5Z20BXdHhOoaVUQqiJL2Lchnlk8lq7oIqvdkDykVHWCaDa:BjrdUOY0phAoaVUQn2LcHk8lq7oIII3P

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks