General

  • Target

    06012025_1556_06012025_PO#17971.zip

  • Size

    706KB

  • Sample

    250106-tdk1qszrhy

  • MD5

    2cf0b13de93f222df2778ef9ec89eda5

  • SHA1

    5afe25a9487f48424f084d060a9a7edfabffcd2d

  • SHA256

    0fb8f39aa39be7957d58bf07677b66d0eb333ee1445d093383e1a8bde7e45ecd

  • SHA512

    1683ffcc27992dda5b0a8b9926fe1e303a582abefe26bd81f6a8686ae25c17a72d83ae5f98e88a7dca4ef92e6c7b64066f5ccc2d914d7d1effcda459aaf9660b

  • SSDEEP

    12288:pIJNlfm4OMjYHnjUlpLG2VxAvqoGbUeioVnmbpSJp:pINlfm4LjuUlpLG2oVanG8Jp

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    wVCMFq@2wVCMFq@2

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      PO#17971.exe

    • Size

      808KB

    • MD5

      a8a2543b3b684c7668e2ea7f0fda818b

    • SHA1

      95f1ef47f4fddae43d5f2923be0498ac20d39ed7

    • SHA256

      1a096b05c22c2f1fe36e1a03e28b49129d1d5812c5b974c929b2213c8dc8896b

    • SHA512

      e47b2426d4359e43d32bfbe87fddcab42d80becc73c117f2b09ce59169ebd641eea13491fcf9b9ce0cfc19e8e7377c96bf925e034680d4dac1257b8a2b285048

    • SSDEEP

      12288:YUoV+I4MVKW3U5Hn4GMtYvvjUNn9KKXLgvaGG5IeiSl3vu/SJuJ:ERgQU5H4Dt6UNn9KKYve3m/SY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks