General

  • Target

    2B34AD054E9DDE8CBC0ABFBE1379A7F0343CB32D92F3411EC2C2FF02AE5673DA

  • Size

    1.2MB

  • Sample

    250103-jng2qaxngp

  • MD5

    66586f95954cb8312b27b30e54de85fb

  • SHA1

    915d491b8db930ee10b6cde8794cbcee301d2779

  • SHA256

    2b34ad054e9dde8cbc0abfbe1379a7f0343cb32d92f3411ec2c2ff02ae5673da

  • SHA512

    58b6769a3e95306eed970861fd37b4f2f5c336779948c591250ae853fee3dfda693ef96fff6062057da6d14c354fc541305972fe90180734b3963d7d8bbc55cf

  • SSDEEP

    24576:5qDEvCTbMWu7rQYlBQcBiT6rprG8avWCQRBGzYJUPWM+fk2m8L:5TvC/MTQYxsWR7avWbBGzrZIJm

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.orchidexports.biz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    WFnE1S3uxpnc

Extracted

Family

vipkeylogger

Targets

    • Target

      2B34AD054E9DDE8CBC0ABFBE1379A7F0343CB32D92F3411EC2C2FF02AE5673DA

    • Size

      1.2MB

    • MD5

      66586f95954cb8312b27b30e54de85fb

    • SHA1

      915d491b8db930ee10b6cde8794cbcee301d2779

    • SHA256

      2b34ad054e9dde8cbc0abfbe1379a7f0343cb32d92f3411ec2c2ff02ae5673da

    • SHA512

      58b6769a3e95306eed970861fd37b4f2f5c336779948c591250ae853fee3dfda693ef96fff6062057da6d14c354fc541305972fe90180734b3963d7d8bbc55cf

    • SSDEEP

      24576:5qDEvCTbMWu7rQYlBQcBiT6rprG8avWCQRBGzYJUPWM+fk2m8L:5TvC/MTQYxsWR7avWbBGzrZIJm

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks