General

  • Target

    E16EDF76C5530906A1DBBCE162F929ABCFD1E4EBC1F3D0844407C7C03964FCC6

  • Size

    1.2MB

  • Sample

    250103-jq1a3svmfw

  • MD5

    02371e83603c6f0718c1297bb9c92139

  • SHA1

    ffceda4117ebb988a1edfd17a539b4992535c53c

  • SHA256

    e16edf76c5530906a1dbbce162f929abcfd1e4ebc1f3d0844407c7c03964fcc6

  • SHA512

    4a9d41ef72bb0643ff7544a4a7494f8d47ba97f42f143a8fe3064eff7d7a8bbf2554090bf36dfd0b5071af19b43324cccc5dcd82d098ea4729d5b3f05c1dca67

  • SSDEEP

    24576:ffmMv6Ckr7Mny5QL9JmVyADuC0yzPjrnHetFM+RKNM:f3v+7/5QLCfDu1yzWtS+IM

Malware Config

Extracted

Family

vipkeylogger

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bulatpharmaceutical.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    XRM)dWOF&~z3

Targets

    • Target

      E16EDF76C5530906A1DBBCE162F929ABCFD1E4EBC1F3D0844407C7C03964FCC6

    • Size

      1.2MB

    • MD5

      02371e83603c6f0718c1297bb9c92139

    • SHA1

      ffceda4117ebb988a1edfd17a539b4992535c53c

    • SHA256

      e16edf76c5530906a1dbbce162f929abcfd1e4ebc1f3d0844407c7c03964fcc6

    • SHA512

      4a9d41ef72bb0643ff7544a4a7494f8d47ba97f42f143a8fe3064eff7d7a8bbf2554090bf36dfd0b5071af19b43324cccc5dcd82d098ea4729d5b3f05c1dca67

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QL9JmVyADuC0yzPjrnHetFM+RKNM:f3v+7/5QLCfDu1yzWtS+IM

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks