General

  • Target

    ReRysunekiProjektowanie-LukaszMirkoofficeflowerfeeling.com-2024-12-020305.eml

  • Size

    2.2MB

  • Sample

    241202-jxz9naskel

  • MD5

    66e338959cd45456d974f188cb375273

  • SHA1

    164ad1352c3ef84fed65099aef6761a89dda7b2c

  • SHA256

    dfa6950c0c9c17d5a3c82e9c57893a0f28cb324be2772d99e488e8ed96134aa0

  • SHA512

    569f493c91fca3fabe5efee87efd8cbf585fa731246fa86c7659f06b99c888aa710188184135a8435199dccb21f065eb7d2d1e594e2799cf7e430d63c1955b58

  • SSDEEP

    24576:UcohiwZ1hsN0mK7vuvua7DBf8mmx3gODgOV5F0w6XuwKMzzB92tChd:q7GN3KKvpQ3x0B

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Rysunek i projektowanie.jpg.exe

    • Size

      1.0MB

    • MD5

      0c79f06a701a4b6ff77a296543332642

    • SHA1

      d51e098288e7cbc13ba9c606e502ec2e02a4c6ca

    • SHA256

      7ee41c51c45e795630d4e6f913f7a1303397ebdd0621edcd8b34fa55ee68ce90

    • SHA512

      174b572b4fe8f11aaa4b3f01ab4af45327a0d63afbdddca22d98e931d47d848b9024a9c869695830984aaa7daa15bca05b64981ba21fc3cb2e6ef9eaec847692

    • SSDEEP

      24576:/u6J33O0c+JY5UZ+XC0kGso6FaLJ2QrS1eD3WY:Ju0c++OCvkGs9FaLyvY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks