General

  • Target

    7ff42bacf844ade960d12cf1df99ce36be17f18903d2188e8de6d410033acaf1

  • Size

    1.2MB

  • Sample

    241130-ntdzgaxlfn

  • MD5

    9d1b974a38b19a833b69f2bfdc0688f8

  • SHA1

    cbdf6cf01a69f8477cfc50d1cc1490457d28d7f3

  • SHA256

    7ff42bacf844ade960d12cf1df99ce36be17f18903d2188e8de6d410033acaf1

  • SHA512

    884c2fb4bd1d8b97fc153c0cc8dbcd0cf9d4eb5ed741fc2d1cd409735fe3f41e7382a7dc2ed21415753b4b5dd89ec7849ff0e21144ec988ed7c4b5e4e623cd41

  • SSDEEP

    24576:ffmMv6Ckr7Mny5QLSvogytmuL2T1101DTxGQ8X:f3v+7/5QLCItmce11KTcQ8X

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7323823089:AAFBRsTW94zIpSoDS8yfGsotlQLqF2I6TU0/sendMessage?chat_id=5013849544

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.vvtrade.vn
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    qVyP6qyv6MQCmZJBRs4t

Targets

    • Target

      7ff42bacf844ade960d12cf1df99ce36be17f18903d2188e8de6d410033acaf1

    • Size

      1.2MB

    • MD5

      9d1b974a38b19a833b69f2bfdc0688f8

    • SHA1

      cbdf6cf01a69f8477cfc50d1cc1490457d28d7f3

    • SHA256

      7ff42bacf844ade960d12cf1df99ce36be17f18903d2188e8de6d410033acaf1

    • SHA512

      884c2fb4bd1d8b97fc153c0cc8dbcd0cf9d4eb5ed741fc2d1cd409735fe3f41e7382a7dc2ed21415753b4b5dd89ec7849ff0e21144ec988ed7c4b5e4e623cd41

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLSvogytmuL2T1101DTxGQ8X:f3v+7/5QLCItmce11KTcQ8X

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks