General

  • Target

    Factura proforma.exe

  • Size

    745KB

  • Sample

    250211-htblfszjbj

  • MD5

    8dc8cf246524b17d39192ce55775a432

  • SHA1

    26b08499349f01da7d19e237faee557896d55960

  • SHA256

    b9b1c8acdc64f654a3d8c2720782e6be9e7e4705f51649dae046324373e698db

  • SHA512

    02911c4024625a952def92c19cd60cf6aa41ff910d18a2069f07bb784d11a0f72b93074c5e9ad3ce541e89e7534d6066e9eb21b04d17731e28359a006fa8910b

  • SSDEEP

    12288:QnPdlJ6taLIKHLrNEVDGmWM4yEImuD+PrbxXD1MX2nxf/1mXi+e4bDvEye9HBr3:4PdlJ6tSTHAWMfRDED1MSrMi+xnMyo

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Factura proforma.exe

    • Size

      745KB

    • MD5

      8dc8cf246524b17d39192ce55775a432

    • SHA1

      26b08499349f01da7d19e237faee557896d55960

    • SHA256

      b9b1c8acdc64f654a3d8c2720782e6be9e7e4705f51649dae046324373e698db

    • SHA512

      02911c4024625a952def92c19cd60cf6aa41ff910d18a2069f07bb784d11a0f72b93074c5e9ad3ce541e89e7534d6066e9eb21b04d17731e28359a006fa8910b

    • SSDEEP

      12288:QnPdlJ6taLIKHLrNEVDGmWM4yEImuD+PrbxXD1MX2nxf/1mXi+e4bDvEye9HBr3:4PdlJ6tSTHAWMfRDED1MSrMi+xnMyo

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      4add245d4ba34b04f213409bfe504c07

    • SHA1

      ef756d6581d70e87d58cc4982e3f4d18e0ea5b09

    • SHA256

      9111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706

    • SHA512

      1bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d

    • SSDEEP

      192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr

    Score
    8/10
    • Downloads MZ/PE file

MITRE ATT&CK Enterprise v15

Tasks