General

  • Target

    PAYMENTRECEIPT_pdf.zip

  • Size

    470KB

  • Sample

    241203-xsrzdavkcm

  • MD5

    34b0bc743a5326f3f3fca952bc187369

  • SHA1

    62290bc1d8e0a631e1763076c90a0f2e452cae14

  • SHA256

    12fc3eb689246a4158ae188d5beec837dba5caeef2624f6193f892daf1873ac4

  • SHA512

    0025c181bfb5349956faee5c2987a129f0365f0c51a9be81187960d75ac61c64fa67b7296f6a34f00873887f63a5828c19ffc171f3df64395512f5a0fb23ea3b

  • SSDEEP

    12288:hcgYTuluZ6pOLiPzJOjRN6uls0/a2AQWZay5:hMTulEkOLi7JWdlD/a2AQ+5

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      PAYMENT RECEIPT_pdf.com

    • Size

      901KB

    • MD5

      15c2b0ab767869aa66c0daac03a1fd85

    • SHA1

      a33914fc9800d4416b0181b0069bc38dbc842ffa

    • SHA256

      277d673f3d70278aac55dac83b12953e07b89d0364baa07ad38506d22fcc1b17

    • SHA512

      684d0dfd17f20ab04f9b46450f2ad1d19390166cf335536d93b3877e10c8841fc389955d68101c3bd434d0462cbd8a82e79b83533f0be594773f9cdf7beb6742

    • SSDEEP

      12288:Kc3kvKB/m4Zm9PFQcSLDwUwMMRNtJhm4fEKKHGQkOcV2S3u:Hs0m9NQcwYMst64sHGp4S

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks