General

  • Target

    28112024_1732_28112024_PO-Q01918 200X150.rar

  • Size

    475KB

  • Sample

    241128-v4er3svjbx

  • MD5

    56ff5220cb8befa53c3875f8dea574fc

  • SHA1

    6c562a95f7d7f300466281e9eb855feabd2afb4e

  • SHA256

    a95cda1e6c13553e2bfe6b50f8339a139e4dbeb72be322b6a7156dfaeb2ada05

  • SHA512

    9c7cf7fea6afb08b11d2270925f4dbb9e45d2fb424db00f8b506bc157d73f2530aaeceaa9368903eb3a1a4ec5aeb0da313984d54aa1cf57818b4a72065cf3c2b

  • SSDEEP

    12288:Rjb3ES/wM4/C/BYziaYzJjJxt7pm4b9BYFCHXCZD:BbUTn/WwiPd/+yyZD

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      PO-Q01918 200X150.exe

    • Size

      557KB

    • MD5

      10af7f586190bc8a4de0850d39975e68

    • SHA1

      77c03f9e53c6fe5b7972741766bcae5c8be022c7

    • SHA256

      0ae1e00bec56390e433869331168026ba022944634003a790324d48ebb129673

    • SHA512

      3117d1e30c6623120815447dfd81f61f00e04e1703a693c21777aa1007908ea45815ccfe47a74df372454f2e9dd284bbf062faa09afb9da6a7e735212946cba3

    • SSDEEP

      12288:1kuicmiSkWUG1iUOFYTqB91HhVs3mySMpQKA:NicmdktG0nYQ1HtGnA

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks