General

  • Target

    9D49009863FC15EA98C88541CC2038B71F28A4510D1EC4DAB2AB9A137BF002CF

  • Size

    1.2MB

  • Sample

    250103-jn54jsxpdj

  • MD5

    672e1968d4e6f0e763497659b0a20c4a

  • SHA1

    857a01cbf3e530bbff46d7edf0fdad047463f097

  • SHA256

    9d49009863fc15ea98c88541cc2038b71f28a4510d1ec4dab2ab9a137bf002cf

  • SHA512

    07680c9ca4c33d18d0811fc03df0dbf01eba2dcbb7f2370fc58108eedf6aacfbae1497ea9c38d87301ef47a22e76121f983a10a78a74c5f280f7f2c4c2399a65

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaCktaC+FyzRngMPYJopIHzJDPxV:7JZoQrbTFZY1iaCktaizRnpgOIH1PxV

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.osconsupplies.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Fin#OSCn@2k2

Extracted

Family

vipkeylogger

Targets

    • Target

      9D49009863FC15EA98C88541CC2038B71F28A4510D1EC4DAB2AB9A137BF002CF

    • Size

      1.2MB

    • MD5

      672e1968d4e6f0e763497659b0a20c4a

    • SHA1

      857a01cbf3e530bbff46d7edf0fdad047463f097

    • SHA256

      9d49009863fc15ea98c88541cc2038b71f28a4510d1ec4dab2ab9a137bf002cf

    • SHA512

      07680c9ca4c33d18d0811fc03df0dbf01eba2dcbb7f2370fc58108eedf6aacfbae1497ea9c38d87301ef47a22e76121f983a10a78a74c5f280f7f2c4c2399a65

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCktaC+FyzRngMPYJopIHzJDPxV:7JZoQrbTFZY1iaCktaizRnpgOIH1PxV

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks