General

  • Target

    c105250dbe628a91b0503acd0265a5fb60a7cba66a1fa483a007dc680e499540

  • Size

    779KB

  • Sample

    250130-kppnmawnd1

  • MD5

    0b7b16d0efd3e6d69f3eb2bfac25224d

  • SHA1

    9a19e9ddfcca1e92e51efb27f3542224daaf3880

  • SHA256

    c105250dbe628a91b0503acd0265a5fb60a7cba66a1fa483a007dc680e499540

  • SHA512

    d22d02346bdf4462a8906243918dfd1c0139e26b479521539d4288046436e9b15ad0c9a2f21b8939e4e6a677499b454e8f7742fa505a52f44ac85871969f0919

  • SSDEEP

    24576:QklFJVNMyFIte7QkrRvvVxYeINMAjOLRUom:QjNezVnVnAjORa

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.zedelta-group.com.my
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    123Zedeltagroup456

Targets

    • Target

      dKvxvrcLy6UCkiU.exe

    • Size

      936KB

    • MD5

      ebcf49d2bdb37228b3561b94480284f2

    • SHA1

      59e20a3d9f1388f181f1a735dd07b682599993b0

    • SHA256

      67a45f51de4d841848ef597e9f9d04de260d45ad777eabc308b4ba827da28a19

    • SHA512

      4b4f581757d01a35160af444f8a9b4cf481134b2723da937ca55357a08b7a077a1c79043080b473a3b52fbd4b6d4e424fbaaf62e64cc2cd87d48d77a2f69c0ef

    • SSDEEP

      24576:EUMAIqMFMteMRCA8AvMyieIlMGjzNwkrdI:EUzh1eMQAnHGj+H

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks