General

  • Target

    Invoice-1150.exe.v

  • Size

    768KB

  • Sample

    250125-dzfp5svmeq

  • MD5

    ef31d9a0edb030c28669b85712413cb1

  • SHA1

    59e9c21a4babd9269fbb72046fb448ba66d16729

  • SHA256

    20bd37d1bc1d656f678d99c15df2610cb2e2f9c4e0b294e504e8508be4c2f658

  • SHA512

    cd051d17fc75ecfa8ba6fcfb6307f70879ee26c29af2bd99507e143956fc0ec510fb3a5b3b22bfbef1c959d0dfab18ee1b5b009dacc4e8768e8bcd9781526ab6

  • SSDEEP

    12288:pqcA1fy1MqCNbvYt4P4Id76TXpDyLi9RqGUGgPKAQj9BM1FPgw+q28xH1xV3KdEP:+5PNbg4h2T5OqqGWKZM1tpH57Va2m

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ruchiraprinting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Ruchira@PR12

Targets

    • Target

      Invoice-1150.exe.v

    • Size

      768KB

    • MD5

      ef31d9a0edb030c28669b85712413cb1

    • SHA1

      59e9c21a4babd9269fbb72046fb448ba66d16729

    • SHA256

      20bd37d1bc1d656f678d99c15df2610cb2e2f9c4e0b294e504e8508be4c2f658

    • SHA512

      cd051d17fc75ecfa8ba6fcfb6307f70879ee26c29af2bd99507e143956fc0ec510fb3a5b3b22bfbef1c959d0dfab18ee1b5b009dacc4e8768e8bcd9781526ab6

    • SSDEEP

      12288:pqcA1fy1MqCNbvYt4P4Id76TXpDyLi9RqGUGgPKAQj9BM1FPgw+q28xH1xV3KdEP:+5PNbg4h2T5OqqGWKZM1tpH57Va2m

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks