General

  • Target

    PLX02346D.rar

  • Size

    705KB

  • Sample

    250123-qg2k4ssmbr

  • MD5

    1c71495531d97e4a00cd359749009c05

  • SHA1

    bbc3df1006f712da6d9c192cb6ad157f6be83891

  • SHA256

    0d14f797c670598a2a2eb3fd6d57a6efda49e7094e73ab2de1e6043f9ef2fa70

  • SHA512

    a819f56f1f9f8d97730dfd54afaaccbeaa4c37bde4fe3d95ee3be6171744c7846295b210390b472f153571024107bfda3a71758eaa81560bd475dd0860988d96

  • SSDEEP

    12288:Lt5t7Kw6cNeHLw9RqSktUZowAO5ncEcJY4AyhHNxuHFq1X:Lt5NIcM08LtYoDkncEcZtxuHFqh

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.expressocargocamp.com.br
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    4ZRBDZAi92icT8S

Targets

    • Target

      hdIt2KwyDuUoSjp.exe

    • Size

      852KB

    • MD5

      91f14f2f493b0510a745b84c53a830aa

    • SHA1

      b25866559dc09ae4ae078a28b021a38ec16247ea

    • SHA256

      0d9002997ab5b1dacce50ec3e131b70218102f036968294965e57e204824a7d0

    • SHA512

      24d8594d5f1a65ca0af1acfa44ca338cfdb3271f6fbc6cbfe1babdfd84cc473bfe824f2ff89564fc749b62a8eaf27ac7e5d6fd46dfbccdfc5f72bacc006da955

    • SSDEEP

      12288:9OJKIO8Df4qv9QsUbQVqE7Vke9PUYMdlaJtGOkXuLdQIa35Hje:9OJpf4qG8VqSVke9PUtkLdQIa356

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks