General

  • Target

    DHL AWB - COMMERCIAL INVOICE & BILL OF LADING.exe

  • Size

    924KB

  • Sample

    250207-sfc78svqgy

  • MD5

    9d14770a66e06aebef0e127c007d5321

  • SHA1

    c6e91ed004b01f5c571878f708f95adc4e3438bc

  • SHA256

    ed3b929652834dc47ce5fcccd629de67024a303a01e2212b9e9f474388226e10

  • SHA512

    d00fbe3a30cb943719f733b86ef12b71f74ba6802f93696bf4e01dbf01f57d7d026e8ce3eaf1131e169186113c53d4f7c8aa434a9f3d2af94a440e7ea6255581

  • SSDEEP

    24576:V0fwt2jbpDHtZtrwz4gl32m1abiDLTmAYu+oA0Ar2U:iot2jbpv9Zgl3rQkMJ97

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      DHL AWB - COMMERCIAL INVOICE & BILL OF LADING.exe

    • Size

      924KB

    • MD5

      9d14770a66e06aebef0e127c007d5321

    • SHA1

      c6e91ed004b01f5c571878f708f95adc4e3438bc

    • SHA256

      ed3b929652834dc47ce5fcccd629de67024a303a01e2212b9e9f474388226e10

    • SHA512

      d00fbe3a30cb943719f733b86ef12b71f74ba6802f93696bf4e01dbf01f57d7d026e8ce3eaf1131e169186113c53d4f7c8aa434a9f3d2af94a440e7ea6255581

    • SSDEEP

      24576:V0fwt2jbpDHtZtrwz4gl32m1abiDLTmAYu+oA0Ar2U:iot2jbpv9Zgl3rQkMJ97

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks