General

  • Target

    specification.zip

  • Size

    689KB

  • Sample

    250124-phrlvsxrb1

  • MD5

    bb7d48936734655a82ca365cead76f72

  • SHA1

    456d069b063dc2a2aa7cff9247e0de76ef903d18

  • SHA256

    6fb7fe5d2fd439f27305c0e8bcc585511ab28e10c02b8e80b169df6a431d30cf

  • SHA512

    43ae95c24a4b1bd7aa7f9cca1f2f509da4ce716858b0baff7a45e443e7ffc45e24f2a4d689a7db9c10954794db7aab1ebeee54dbb8d8b23e474bae3c0c2d393b

  • SSDEEP

    12288:n7X6DtQdLyW2YY/h8YnkqNMzq74N4tqj4rL7O45VG/egfmb+SZJK8Km4mRY:n7YudGYYp8ghMhNhj4rLi6VJgfO92L

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aktagor-prom.by
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    71z&rRC84

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      specification.exe

    • Size

      780KB

    • MD5

      c5b2f0199c91bcb176ab0867737b2a8c

    • SHA1

      9265256c80c7e845b484386810c15a5d5ba56868

    • SHA256

      13fd36bd0ad2ef303ded0dac6b7cd6d4326ffebb08ff914eb44a6e75c52e8289

    • SHA512

      463a7a803282b1c7f2b191ca2784d53d3299abd9a53cc06c1e71807ccccc7519d4fb3a8d2176c1e9f5331ae093b28cae274450426849a6226b9a6705df705827

    • SSDEEP

      12288:pZtu7+J+LSY/h4Yn2wNOVzfq3R7yqVfaqG/Qcav9om2b+iZJKfA:N/JySYp4gbOVziBuqFcY9jeD/

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks