General

  • Target

    51a12dd99530488f1adc777e2479b57e984997635e2ba773d69ff27718bcb299.exe

  • Size

    1.4MB

  • Sample

    250123-d56thszngv

  • MD5

    eff7dd3a56f73b474ab728ef0e2e85e9

  • SHA1

    b4c80d658f496e938778db42e43dd904ec308a52

  • SHA256

    51a12dd99530488f1adc777e2479b57e984997635e2ba773d69ff27718bcb299

  • SHA512

    74a9b7522f17f999d84e146f584035b1413fcf637e6d8d1daf60826a6eea74f16d4397ac98f1eaed50c00d28e88f6b7acfd0b7e214df6d278d62dd525af669d4

  • SSDEEP

    24576:mtb20pkaCqT5TBWgNQ7all4LGInoXLTBqFh+xrIKMT1JMuSv/c6A:TVg5tQ7alqLJQL0Fhhhf5

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    cash@com12345

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      51a12dd99530488f1adc777e2479b57e984997635e2ba773d69ff27718bcb299.exe

    • Size

      1.4MB

    • MD5

      eff7dd3a56f73b474ab728ef0e2e85e9

    • SHA1

      b4c80d658f496e938778db42e43dd904ec308a52

    • SHA256

      51a12dd99530488f1adc777e2479b57e984997635e2ba773d69ff27718bcb299

    • SHA512

      74a9b7522f17f999d84e146f584035b1413fcf637e6d8d1daf60826a6eea74f16d4397ac98f1eaed50c00d28e88f6b7acfd0b7e214df6d278d62dd525af669d4

    • SSDEEP

      24576:mtb20pkaCqT5TBWgNQ7all4LGInoXLTBqFh+xrIKMT1JMuSv/c6A:TVg5tQ7alqLJQL0Fhhhf5

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks