General

  • Target

    UNIROD-RFQ00125.Tar

  • Size

    497KB

  • Sample

    250106-sqffcasjgq

  • MD5

    a9bcdf646fa80e4bb13ecc53621a6ee8

  • SHA1

    9edaf8f6f9ae6dca96fb4b87feca8f074fd64829

  • SHA256

    a8bd196fa4696263f79e8c3c74846a375529fa81bfefaf38164f7255e848d700

  • SHA512

    92ae57ed65de67479807a7a7f7d67e8b3674ac5aab1e08526f522665013ebbe02246f346f07a99fc66e7ad9f3b5eca540d9e626136c14797ca6672e6d0c0653e

  • SSDEEP

    6144:KW9xYsxXmAo2vr47pUAzuNj7dKgtKqZbYnImXLQf9Ko6n7hHGKcLleaSJZUHr0Wq:U42AVEYjRKgbYnIPVKx7DiJSJTDSdEIm

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.techniqueqatar.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    TechFB2023$$$

Extracted

Family

vipkeylogger

Targets

    • Target

      UNIROD-RFQ-010625001.cmd

    • Size

      1.1MB

    • MD5

      14640c06f8494da0aac5be1cb00865e0

    • SHA1

      3bec66d765e049fcb93f99b7ebf1d6a8f57366f9

    • SHA256

      2195099bea2aa33cf3a585bc1ac1c22ce10b2ca5bf8ea9cf0fe1e041cc9945ac

    • SHA512

      77b08c292c86ec2b989b36da656f161532c60a1a16cbd888b4700f227269f34e00be001883a4fb5c6e51cf485d72196aecef048a831665fd6eb45920772939da

    • SSDEEP

      24576:Gw6yj+R7ydItm/2uQAGYDKAVcpzWc4ctu:GDBR2KTYDKArc4Ku

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks