General

  • Target

    EFT Remittance Slip for Due Invoice.exe

  • Size

    1.2MB

  • Sample

    250129-kjypca1jdp

  • MD5

    8c6ad00d939323abfb5ebef28bc8ca00

  • SHA1

    b80b7621a8af48cd62361b938f8727d181661f2f

  • SHA256

    eb3dcc6f02b890aeaa2368161d863b645a4c115bb4385278f80335ffb6143041

  • SHA512

    2b3365e3c5d865502121fbae148158aef1d3a9ada2b9152d997c96bad5aa51247a7c1eea1dcea48c98ba09b547b0f58450e2c3e3c62ba80d15571a432d72fc04

  • SSDEEP

    24576:KAHnh+eWsN3skA4RV1Hom2KXFmIaIcPGZV+2urmZ5XEo5:dh+ZkldoPK1XaIcPGmrC5f

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.norcalwholehousefans.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Pythonk2024!@#$

Extracted

Family

vipkeylogger

Targets

    • Target

      EFT Remittance Slip for Due Invoice.exe

    • Size

      1.2MB

    • MD5

      8c6ad00d939323abfb5ebef28bc8ca00

    • SHA1

      b80b7621a8af48cd62361b938f8727d181661f2f

    • SHA256

      eb3dcc6f02b890aeaa2368161d863b645a4c115bb4385278f80335ffb6143041

    • SHA512

      2b3365e3c5d865502121fbae148158aef1d3a9ada2b9152d997c96bad5aa51247a7c1eea1dcea48c98ba09b547b0f58450e2c3e3c62ba80d15571a432d72fc04

    • SSDEEP

      24576:KAHnh+eWsN3skA4RV1Hom2KXFmIaIcPGZV+2urmZ5XEo5:dh+ZkldoPK1XaIcPGmrC5f

    • Modifies Windows Defender DisableAntiSpyware settings

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks