General

  • Target

    0cac75f1f61f9fcca09695de695e469d62f7e73147ba678f7d6dcb4eea80389c.exe

  • Size

    894KB

  • Sample

    250130-ddvxyawpgs

  • MD5

    0e95aefb05f8ae07d337bef71ddc35b3

  • SHA1

    e1f80b20b2ea7524ecd3e339c4b1434df0693e3c

  • SHA256

    0cac75f1f61f9fcca09695de695e469d62f7e73147ba678f7d6dcb4eea80389c

  • SHA512

    58c12075cdb7ef88a6aca4bfc4d6965b067be5d6f186b957520fc9f310a795bc5b9b37bf5c574bd1e1749c32c9202ba989dc5bd89c2ea64b159c767ce0743689

  • SSDEEP

    12288:szSggsihEj9EQjx56PSOhjWkwn1g4AXDM0KXyOjCc7YuYfQSJE2R38TyX:szGdQWPSSjWpngX3KZ7tYfQq8T

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aktagor-prom.by
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    71z&rRC84

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      0cac75f1f61f9fcca09695de695e469d62f7e73147ba678f7d6dcb4eea80389c.exe

    • Size

      894KB

    • MD5

      0e95aefb05f8ae07d337bef71ddc35b3

    • SHA1

      e1f80b20b2ea7524ecd3e339c4b1434df0693e3c

    • SHA256

      0cac75f1f61f9fcca09695de695e469d62f7e73147ba678f7d6dcb4eea80389c

    • SHA512

      58c12075cdb7ef88a6aca4bfc4d6965b067be5d6f186b957520fc9f310a795bc5b9b37bf5c574bd1e1749c32c9202ba989dc5bd89c2ea64b159c767ce0743689

    • SSDEEP

      12288:szSggsihEj9EQjx56PSOhjWkwn1g4AXDM0KXyOjCc7YuYfQSJE2R38TyX:szGdQWPSSjWpngX3KZ7tYfQq8T

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks