General

  • Target

    114117914 - Rebound Electronics.exe

  • Size

    1.0MB

  • Sample

    241120-k5llxayreq

  • MD5

    f336089abf758f7bb565ebd1366e2ad2

  • SHA1

    3e5ee53a5014900cef867428b99d92567669bf7f

  • SHA256

    69e4226931e9735180c32894ac2e0604fc2c9e820781d3fc79b96451ca738072

  • SHA512

    96c866c68314876afe0a7fd54e6124b0899916cc456099354e217a67ffdbef6235003d34262545fc58bd29658ebb2818d07876127f30a4e120ecb197c9d97b4a

  • SSDEEP

    24576:Ztb20pkaCqT5TBWgNQ7ajzpeVKp/teALURW6A:qVg5tQ7ajiKp17N5

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    panta.home.pl
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    PANTA#Gda$2023

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      114117914 - Rebound Electronics.exe

    • Size

      1.0MB

    • MD5

      f336089abf758f7bb565ebd1366e2ad2

    • SHA1

      3e5ee53a5014900cef867428b99d92567669bf7f

    • SHA256

      69e4226931e9735180c32894ac2e0604fc2c9e820781d3fc79b96451ca738072

    • SHA512

      96c866c68314876afe0a7fd54e6124b0899916cc456099354e217a67ffdbef6235003d34262545fc58bd29658ebb2818d07876127f30a4e120ecb197c9d97b4a

    • SSDEEP

      24576:Ztb20pkaCqT5TBWgNQ7ajzpeVKp/teALURW6A:qVg5tQ7ajiKp17N5

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks