General

  • Target

    8fde836a0e46711f6f778a38c8adeeb36a93cbfe8fa5aa71de5670d34f62b7efN.exe

  • Size

    1.1MB

  • Sample

    241126-kklfeazmbl

  • MD5

    888e0b4e0d654d8184eb091d60df6280

  • SHA1

    60200c8bacdedcf599c529e45e847c392a7f8468

  • SHA256

    8fde836a0e46711f6f778a38c8adeeb36a93cbfe8fa5aa71de5670d34f62b7ef

  • SHA512

    2885700c557afaf012bc3cbc22171cc2dc55db07c4f38be80549cbdd03f619d4f1afc1e2d58609330def3b29a4d85f97d16995792a3cf62e3a35b7dd01af87f3

  • SSDEEP

    24576:9tb20pkaCqT5TBWgNQ7acSD+Kq7/0noQRge5AtDfi36A:uVg5tQ7acSD+Kqb0oQStE5

Malware Config

Extracted

Family

vipkeylogger

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.phoenixexports.co.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    phex1234

Targets

    • Target

      8fde836a0e46711f6f778a38c8adeeb36a93cbfe8fa5aa71de5670d34f62b7efN.exe

    • Size

      1.1MB

    • MD5

      888e0b4e0d654d8184eb091d60df6280

    • SHA1

      60200c8bacdedcf599c529e45e847c392a7f8468

    • SHA256

      8fde836a0e46711f6f778a38c8adeeb36a93cbfe8fa5aa71de5670d34f62b7ef

    • SHA512

      2885700c557afaf012bc3cbc22171cc2dc55db07c4f38be80549cbdd03f619d4f1afc1e2d58609330def3b29a4d85f97d16995792a3cf62e3a35b7dd01af87f3

    • SSDEEP

      24576:9tb20pkaCqT5TBWgNQ7acSD+Kq7/0noQRge5AtDfi36A:uVg5tQ7acSD+Kqb0oQStE5

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks