General

  • Target

    payment reciept.pdf.exe

  • Size

    507KB

  • Sample

    250129-q62x6szmew

  • MD5

    0517a7b49af5d833776cff01c762dd3e

  • SHA1

    4ae94d61c16cca31050d0cbe1a4a739610a242be

  • SHA256

    924f984282e8cdcc20d74a26af3f94488c0a5a22c153dd6ed1f6b5e4deaac1f2

  • SHA512

    ed2325f5d7c2d765a1cf208533862354ea8321e6b0a34c274bbd530445457498e613e37316f0ed7c71038d4461c3b52169236da642d0aca38562502ef42ae73c

  • SSDEEP

    12288:HYV6MorX7qzuC3QHO9FQVHPF51jgcHiy+rJxPYXq:UBXu9HGaVH4rJ0q

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    aa209bmt

Targets

    • Target

      payment reciept.pdf.exe

    • Size

      507KB

    • MD5

      0517a7b49af5d833776cff01c762dd3e

    • SHA1

      4ae94d61c16cca31050d0cbe1a4a739610a242be

    • SHA256

      924f984282e8cdcc20d74a26af3f94488c0a5a22c153dd6ed1f6b5e4deaac1f2

    • SHA512

      ed2325f5d7c2d765a1cf208533862354ea8321e6b0a34c274bbd530445457498e613e37316f0ed7c71038d4461c3b52169236da642d0aca38562502ef42ae73c

    • SSDEEP

      12288:HYV6MorX7qzuC3QHO9FQVHPF51jgcHiy+rJxPYXq:UBXu9HGaVH4rJ0q

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks