General

  • Target

    20872186527.zip

  • Size

    304KB

  • Sample

    250120-yat7fsvnhn

  • MD5

    b3f4b9b389583868d01ff6476d6e64fd

  • SHA1

    309a11c77cfc6fd036b17d84f94ef92805fc74a5

  • SHA256

    d59b1337750efa99c54d235a4ae25fd4a99f1c202b27248105cfcbc37edc45dc

  • SHA512

    b0c490eb13494d9a2a7d411c5f9a4524a4f812639d0c9892b0e1601d75c19aa9e7cebb810a807f274f7b993dc040167c7233b5a85a4b7b1df8cebe063c63952f

  • SSDEEP

    6144:xX0C8Ak6DLj04aumwtchc0b1iZ2X8VuTAWxzC2EfTY0wc:50dum8c7b19XiezDE7d

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Factura.exe

    • Size

      337KB

    • MD5

      60274794f3fb71d2d5ba5e79040e848a

    • SHA1

      540d7a3a0923aa576185561d931616b10a069074

    • SHA256

      49b4309c8ed22ee8489f94f5fa9723c019e8d62b84fb284156f7211fe515fe87

    • SHA512

      1c7e29c213ca2b9e8237f0c0f214ae1ffb334d418c36b659fbe7ebe44c30fe1f4748c77407914ddb1cc3a830a7abedd1fc680e3d969199bfe1304ef3c482c39b

    • SSDEEP

      6144:mgyJN9fUXZ858P8GkWF6JVUs4yVrgBaoZdjW/CVzT8yrJLnIgEO:YJN9I2EZku6Jms4yEdjWqVzPrJLIgEO

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks