General

  • Target

    new medline order.pdf.exe

  • Size

    1.2MB

  • Sample

    250124-rkj1xatnhm

  • MD5

    eb7ca84cf3982c449e38e234bf387ca7

  • SHA1

    b5418d002ca5cbb2afdd5592c18655d089e3d344

  • SHA256

    49ce4bee8e0c8178aad7c4c71abd4bc832b4696b84c5677cb5b30cc698ce8e8c

  • SHA512

    08cf28d372da263690aa2cdc3dae830291c7030f9d2ca16d51574bbe888ac77940011757e3f114dfab1fed99ce34036ec3d1fe2a9b480517de0cf7120c3e0e57

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaCCf0wGSIOuhQB2vZcLUdSYEyeRo6MehPde6j:7JZoQrbTFZY1iaCC8wfaDcodSY45bj

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot8066712820:AAEAb01u8B6eDO5xCMdAz6XCOHC_L2RpVGo/sendMessage?chat_id=7667424178

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Global786@

Targets

    • Target

      new medline order.pdf.exe

    • Size

      1.2MB

    • MD5

      eb7ca84cf3982c449e38e234bf387ca7

    • SHA1

      b5418d002ca5cbb2afdd5592c18655d089e3d344

    • SHA256

      49ce4bee8e0c8178aad7c4c71abd4bc832b4696b84c5677cb5b30cc698ce8e8c

    • SHA512

      08cf28d372da263690aa2cdc3dae830291c7030f9d2ca16d51574bbe888ac77940011757e3f114dfab1fed99ce34036ec3d1fe2a9b480517de0cf7120c3e0e57

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCCf0wGSIOuhQB2vZcLUdSYEyeRo6MehPde6j:7JZoQrbTFZY1iaCC8wfaDcodSY45bj

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks