General

  • Target

    SwiftCopy839038903pdf.iso

  • Size

    1.1MB

  • Sample

    250114-swgwcstmhq

  • MD5

    899d2b8ff826322726411c11e2f2cb37

  • SHA1

    98ed5384de8a7fd68fa7d55fdd6997b9c102d615

  • SHA256

    16d02da91883c9a647366f32cc807a6254349c3a19661493436eac67e46471cb

  • SHA512

    c476c4aa4a3b36c34196909092bf4f477238e371ad6808c6cd3d6a78f0ee357237fb1ea3c2f26980cd8ebb7f32268fbccdfd3e85e817e26a29a9c96343d4a265

  • SSDEEP

    24576:IMaSSKy2/SPNeHEb5fzaFTqphfK6aBt/mC8:IRQUJaFTMmh

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7199790900:AAH-a-1uulA8aVgkku_Nct-9FyNkWwIUg_U/sendMessage?chat_id=7437481970

Targets

    • Target

      Swift Copy839038903 pdf.exe

    • Size

      1019KB

    • MD5

      85cf0c44fc38c719fb8c43cce268412b

    • SHA1

      1051d322089827e3bd6801a18c2896bc39a31fef

    • SHA256

      9a5c8968d3a211f80ac81ddc3ca5e1007c3eb4104fc8dc866f810eeb0e3256a5

    • SHA512

      270b3500f4d41df13350ad5a5c1fe2716c299b5193cc7eb8144c998becaf3654c8af2ab477604e8463e732add1db420850fe667414d8723351f5d74b9336e7a1

    • SSDEEP

      24576:3MaSSKy2/SPNeHEb5fzaFTqphfK6aBt/mC8:3RQUJaFTMmh

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks