General

  • Target

    d4e2fbfc32056e62acf75175d7612639a9987bea0b543c1805235c9582d4991a.exe

  • Size

    1.1MB

  • Sample

    250110-rxhnlsxjgs

  • MD5

    3599e1d5d724fbb382a29f1cad0aeda4

  • SHA1

    3e1b82de92038cdb85749473ddaef0d680765d23

  • SHA256

    d4e2fbfc32056e62acf75175d7612639a9987bea0b543c1805235c9582d4991a

  • SHA512

    4d977f01f4c90b55489e9ae40e61ef545dcc74da26a29f66b3fecb19610ba4903df82127a5ed8e50c2120e9be3a88eafb04ce94f70107e55e5980e2869915ee9

  • SSDEEP

    24576:3u6J33O0c+JY5UZ+XC0kGso6FakmIjQd2gvMSgt6EWY:Ru0c++OCvkGs9Fakqd22v7Y

Malware Config

Extracted

Family

vipkeylogger

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.starofseasmarine.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Dontforget2015

Targets

    • Target

      d4e2fbfc32056e62acf75175d7612639a9987bea0b543c1805235c9582d4991a.exe

    • Size

      1.1MB

    • MD5

      3599e1d5d724fbb382a29f1cad0aeda4

    • SHA1

      3e1b82de92038cdb85749473ddaef0d680765d23

    • SHA256

      d4e2fbfc32056e62acf75175d7612639a9987bea0b543c1805235c9582d4991a

    • SHA512

      4d977f01f4c90b55489e9ae40e61ef545dcc74da26a29f66b3fecb19610ba4903df82127a5ed8e50c2120e9be3a88eafb04ce94f70107e55e5980e2869915ee9

    • SSDEEP

      24576:3u6J33O0c+JY5UZ+XC0kGso6FakmIjQd2gvMSgt6EWY:Ru0c++OCvkGs9Fakqd22v7Y

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks