General
-
Target
Factura proforma.exe
-
Size
745KB
-
Sample
250210-sba73svpcp
-
MD5
8dc8cf246524b17d39192ce55775a432
-
SHA1
26b08499349f01da7d19e237faee557896d55960
-
SHA256
b9b1c8acdc64f654a3d8c2720782e6be9e7e4705f51649dae046324373e698db
-
SHA512
02911c4024625a952def92c19cd60cf6aa41ff910d18a2069f07bb784d11a0f72b93074c5e9ad3ce541e89e7534d6066e9eb21b04d17731e28359a006fa8910b
-
SSDEEP
12288:QnPdlJ6taLIKHLrNEVDGmWM4yEImuD+PrbxXD1MX2nxf/1mXi+e4bDvEye9HBr3:4PdlJ6tSTHAWMfRDED1MSrMi+xnMyo
Static task
static1
Behavioral task
behavioral1
Sample
Factura proforma.exe
Resource
win7-20250207-es
Behavioral task
behavioral2
Sample
Factura proforma.exe
Resource
win10v2004-20250207-es
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-es
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250129-es
Malware Config
Extracted
Protocol: smtp- Host:
mail.grupobdb.com - Port:
587 - Username:
[email protected] - Password:
gsn224v
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.grupobdb.com - Port:
587 - Username:
[email protected] - Password:
gsn224v - Email To:
[email protected]
Targets
-
-
Target
Factura proforma.exe
-
Size
745KB
-
MD5
8dc8cf246524b17d39192ce55775a432
-
SHA1
26b08499349f01da7d19e237faee557896d55960
-
SHA256
b9b1c8acdc64f654a3d8c2720782e6be9e7e4705f51649dae046324373e698db
-
SHA512
02911c4024625a952def92c19cd60cf6aa41ff910d18a2069f07bb784d11a0f72b93074c5e9ad3ce541e89e7534d6066e9eb21b04d17731e28359a006fa8910b
-
SSDEEP
12288:QnPdlJ6taLIKHLrNEVDGmWM4yEImuD+PrbxXD1MX2nxf/1mXi+e4bDvEye9HBr3:4PdlJ6tSTHAWMfRDED1MSrMi+xnMyo
-
Guloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
4add245d4ba34b04f213409bfe504c07
-
SHA1
ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
-
SHA256
9111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
-
SHA512
1bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d
-
SSDEEP
192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2