General

  • Target

    2caa04a44473cabb6298e6ce1c313beafb4a942641aed58ef247bb901f7ea314.exe

  • Size

    1.1MB

  • Sample

    250111-daweaszndz

  • MD5

    65190ca2ca5f79e9f61cc56883158455

  • SHA1

    3c66b52af1d4ca0b06835198575737c82b0db864

  • SHA256

    2caa04a44473cabb6298e6ce1c313beafb4a942641aed58ef247bb901f7ea314

  • SHA512

    920fc879f4932647a9dbc8218c6606cfb1cf2aa681460dc4a4e8374eaed3060cdb3e39d6524a737006ad2f40dbb80e9a420ebd5ce3121dda39ab3307f3a7ca07

  • SSDEEP

    24576:uu6J33O0c+JY5UZ+XC0kGso6FaBNRZbciHTgnKzfpWY:gu0c++OCvkGs9FaBpbcdnNY

Malware Config

Extracted

Family

vipkeylogger

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.starofseasmarine.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Dontforget2015

Targets

    • Target

      2caa04a44473cabb6298e6ce1c313beafb4a942641aed58ef247bb901f7ea314.exe

    • Size

      1.1MB

    • MD5

      65190ca2ca5f79e9f61cc56883158455

    • SHA1

      3c66b52af1d4ca0b06835198575737c82b0db864

    • SHA256

      2caa04a44473cabb6298e6ce1c313beafb4a942641aed58ef247bb901f7ea314

    • SHA512

      920fc879f4932647a9dbc8218c6606cfb1cf2aa681460dc4a4e8374eaed3060cdb3e39d6524a737006ad2f40dbb80e9a420ebd5ce3121dda39ab3307f3a7ca07

    • SSDEEP

      24576:uu6J33O0c+JY5UZ+XC0kGso6FaBNRZbciHTgnKzfpWY:gu0c++OCvkGs9FaBpbcdnNY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks