Resubmissions

20-12-2024 17:57

241220-wjpl8a1kat 10

20-12-2024 17:53

241220-wgmpva1jft 6

General

  • Target

    FACTURA 5004.-28 11 2024.rar

  • Size

    489KB

  • Sample

    241220-wjpl8a1kat

  • MD5

    adb9af782e53eb4a4e8c3d985b26eba4

  • SHA1

    4858799d16e585bd603d5034fff97afe81f92f0d

  • SHA256

    e198860d43c4965beef749f26ce30c5d2f874b0a59620d3d4c3c7f0c3abb38f5

  • SHA512

    948e552b136e2336055b6b70d9f0db51cf6e116b3bf19cdf13163ad71653304b0ea7e17ff174433ec59d92c4a61df2b024c736e19bbf9f18fc261cd7fd2333f2

  • SSDEEP

    12288:XY/3dduwHbKTFtQOo/XGBbFIvSisLYp4xY+o5EpL0Fq:GdTYDGXmi8ZJoqJ00

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      FACTURA 5004.-28 11 2024.exe

    • Size

      570KB

    • MD5

      622129ae990e84785b59a7c49769f1a5

    • SHA1

      691be4e876979b11ac60494ed026c780d7291e2e

    • SHA256

      bc52c9be844b9640dd46be53fe57fa01135fbe1f570f87369690176e925ffa18

    • SHA512

      a470d8c219bf126064fdfc96ec8855f4383b8ccc595cb5a2946b82a4635fca67f463f98359096611b4fde71a375176d084e82345ea4312f0f5205cc1960593f6

    • SSDEEP

      12288:1kuic98di0vU+lTb4Tmp6mAWn6Ui+LOFLmySMpQKE:Nic9Yi+4Tmp6mN6+LOFyGnE

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks