General
-
Target
PLX02346D.rar
-
Size
705KB
-
Sample
250123-qg2k4ssmbr
-
MD5
1c71495531d97e4a00cd359749009c05
-
SHA1
bbc3df1006f712da6d9c192cb6ad157f6be83891
-
SHA256
0d14f797c670598a2a2eb3fd6d57a6efda49e7094e73ab2de1e6043f9ef2fa70
-
SHA512
a819f56f1f9f8d97730dfd54afaaccbeaa4c37bde4fe3d95ee3be6171744c7846295b210390b472f153571024107bfda3a71758eaa81560bd475dd0860988d96
-
SSDEEP
12288:Lt5t7Kw6cNeHLw9RqSktUZowAO5ncEcJY4AyhHNxuHFq1X:Lt5NIcM08LtYoDkncEcZtxuHFqh
Static task
static1
Behavioral task
behavioral1
Sample
hdIt2KwyDuUoSjp.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
hdIt2KwyDuUoSjp.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.expressocargocamp.com.br - Port:
587 - Username:
[email protected] - Password:
4ZRBDZAi92icT8S - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.expressocargocamp.com.br - Port:
587 - Username:
[email protected] - Password:
4ZRBDZAi92icT8S
Targets
-
-
Target
hdIt2KwyDuUoSjp.exe
-
Size
852KB
-
MD5
91f14f2f493b0510a745b84c53a830aa
-
SHA1
b25866559dc09ae4ae078a28b021a38ec16247ea
-
SHA256
0d9002997ab5b1dacce50ec3e131b70218102f036968294965e57e204824a7d0
-
SHA512
24d8594d5f1a65ca0af1acfa44ca338cfdb3271f6fbc6cbfe1babdfd84cc473bfe824f2ff89564fc749b62a8eaf27ac7e5d6fd46dfbccdfc5f72bacc006da955
-
SSDEEP
12288:9OJKIO8Df4qv9QsUbQVqE7Vke9PUYMdlaJtGOkXuLdQIa35Hje:9OJpf4qG8VqSVke9PUtkLdQIa356
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2