Resubmissions

17-01-2025 08:33

250117-kf35nazkfr 10

General

  • Target

    20751840297.zip

  • Size

    753KB

  • Sample

    250117-kf35nazkfr

  • MD5

    33350ad9d6d5ea005771c7d13c10f6ce

  • SHA1

    bd2966a8733e7dbc1a5ddaff7a77ad0bd0daccf7

  • SHA256

    f62c28f46869e0723b2760ff79f84fe75f1f8ef938bff3cfdf21836fc0efebfc

  • SHA512

    7c8139fc5bc879f517b708c7d60d4dd5ca0e4611342b3c3882a12260d619510f21c21f391c274d19e21917cd878899684a5418e80f6d52c605927c0b4651c569

  • SSDEEP

    12288:f4G22BCKs28awDXeMfrLH21mco+RR181NA5pKGDn3QDZKHX8Sb5BGjTeQ5XV9rL1:f4CCKsRhHrLW1mw18PAOd8X+2Q5lP

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ruchiraprinting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Ruchira@PR12

Targets

    • Target

      C24TAA-00343127-WEM0G8XYGD3-DPH.exe

    • Size

      795KB

    • MD5

      b02a4d403c3cbb558b7e1c278308d9cf

    • SHA1

      0310e74a641adb79192eb93e4cdeda5fad4f1747

    • SHA256

      bf3c1941de57148eb6de474d360c57a08582dbb3ee548c283fa34cb08436e402

    • SHA512

      0a41de9a105cf4893ccca294ecce60852ed1e015d5111690e01b4b2728445b53beff8ffcfbe103cca95af1e861e64b518df8c144eb3d1a5009fe52f20c1397c6

    • SSDEEP

      12288:8AB7hgn0fsOLvycEuUDg09ZK8X2fhASSCD0w/KbqWFvbvuEGmz18v354BtJmT3L1:NNQDBLK8qSnMKHDvuEGg1U3ezJGF3

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks