General

  • Target

    Maosh qog'ozi.rar

  • Size

    220KB

  • Sample

    241215-s3nbqaylds

  • MD5

    284bcf3a08a8115546dbea1d7fbfcb8e

  • SHA1

    737caceda807e3579025521dd649ece30473ff9a

  • SHA256

    c3c2a267fbdc287aad468f00d09dabcc330ddbcc639bed0508fba38f645cf3c0

  • SHA512

    26e0da8f3284de93094441e65b5a5228d6988941395c5da2d73da4f14db7f5a60dc5247d515526e2742627a55f5e50eb2f0811afb80cbba868b20591b04ba8eb

  • SSDEEP

    6144:cPjv2XG1j/pAnV4ZBdd0RgFlg7IK8KEVh5Xrg22Q:I72kjunKZB79CGlXrg22Q

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.hostinger.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    eQ&vwpXMsK38

Targets

    • Target

      Maosh qog'ozi.exe

    • Size

      357KB

    • MD5

      7eaadf6469c409d04d372f3ae56ebf87

    • SHA1

      9a21d453272387a014a47f843a3e495da11d1f74

    • SHA256

      c9db49c9cc19516d4a95548d1ce4ce1f36df8c40e690c14bcb547ddb1e789bb1

    • SHA512

      cfbf3b1c8cd0f5d57e0bebebbe7fe3abac73fe09854b8f26b5bd20c0413f786fb644f9d0c5f49bb6682e2a524ee34dc54dd95a80b752b5b47c05a88e5746077c

    • SSDEEP

      6144:NoIwxcKWibHiyvLZo4kczch/to9QK5cNVIFRvCOaGrgXak+tkl0Wc:NbKW6hzZowBCGr4aztkN

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks