General

  • Target

    document pdf.exe

  • Size

    742KB

  • Sample

    250106-scjwls1qdj

  • MD5

    c67b6ff2d472bf82dc4da545dbc37a43

  • SHA1

    c5e677e5e48d5ca965b6e2d3f0c8b56fb80e7be5

  • SHA256

    df3c8cc4eaf6b0a8a6a0254c54160486df1b38f8a6591a60dbc520f38389c400

  • SHA512

    69ba6f8e9e99f09a669ae875412af6bcb87dd649161e8e725be05c9db2ce8fe20da88de509cd9208a427b93172caeb94ed588efa5697eb0ebf5fe262d8943e11

  • SSDEEP

    12288:74doaeS+/ZgdvAC+O8DzxPzNjZGtypP2q2PEexgQNqaCBCrRKNr6sj9Gn:EdFeSTdv+O8vxPzNjUtE7280RNqaLrMc

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    wVCMFq@2wVCMFq@2

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      document pdf.exe

    • Size

      742KB

    • MD5

      c67b6ff2d472bf82dc4da545dbc37a43

    • SHA1

      c5e677e5e48d5ca965b6e2d3f0c8b56fb80e7be5

    • SHA256

      df3c8cc4eaf6b0a8a6a0254c54160486df1b38f8a6591a60dbc520f38389c400

    • SHA512

      69ba6f8e9e99f09a669ae875412af6bcb87dd649161e8e725be05c9db2ce8fe20da88de509cd9208a427b93172caeb94ed588efa5697eb0ebf5fe262d8943e11

    • SSDEEP

      12288:74doaeS+/ZgdvAC+O8DzxPzNjZGtypP2q2PEexgQNqaCBCrRKNr6sj9Gn:EdFeSTdv+O8vxPzNjUtE7280RNqaLrMc

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks