General

  • Target

    New Order list.exe

  • Size

    1.2MB

  • Sample

    250124-q8m7ss1pcs

  • MD5

    92989c056a40b4392ac3ff1d3cb872f2

  • SHA1

    4b2856511905dcaa9c2cdcd032a829cfb2854690

  • SHA256

    b3d5e0501023486fe1f2af3ecd075b98710331cc60268eda247c3ee41ee072a4

  • SHA512

    2dbc248557c70b457efbe884c969316a037d87e117d633fdb62b7d4d612b7e8aaae0d3df0298d7843aee16394f79de84fe5ad9c8ac9201ab1b8697cca65d9d27

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaC48VHnTyFb49oFnm69fK49By5BRwiq6:7JZoQrbTFZY1iaC46HnKnm6I49U7N

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    cash@com12345

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      New Order list.exe

    • Size

      1.2MB

    • MD5

      92989c056a40b4392ac3ff1d3cb872f2

    • SHA1

      4b2856511905dcaa9c2cdcd032a829cfb2854690

    • SHA256

      b3d5e0501023486fe1f2af3ecd075b98710331cc60268eda247c3ee41ee072a4

    • SHA512

      2dbc248557c70b457efbe884c969316a037d87e117d633fdb62b7d4d612b7e8aaae0d3df0298d7843aee16394f79de84fe5ad9c8ac9201ab1b8697cca65d9d27

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaC48VHnTyFb49oFnm69fK49By5BRwiq6:7JZoQrbTFZY1iaC46HnKnm6I49U7N

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks