General

  • Target

    02cbe218509db2fc3e814bd6bf5cd159e59e42318bf72e13a56432cdece2d463.rar

  • Size

    1.1MB

  • Sample

    250213-claras1mhm

  • MD5

    499a24731845f4f612f15e57cd7145fa

  • SHA1

    591e6420a02dc75a802ff213f259ac5c41759430

  • SHA256

    02cbe218509db2fc3e814bd6bf5cd159e59e42318bf72e13a56432cdece2d463

  • SHA512

    779f4e5227297654b3ee0caecce9e7d011d597e3b76c3a457fe1cf056890eb6ef27358c8744492349f02b1cc1b6eefabfb2ac41a8116a8c81ffcbd0917ece3d9

  • SSDEEP

    24576:yfZp/6LJ+vXkCPCEJTW/F4AchuKOqzX0x31AOVMH+xYoesTH2H7:ySLJylzWtbMOg8FAOOOHxHU

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      dhl.exe

    • Size

      1.2MB

    • MD5

      c05369e8d3a9d0853cf1887e4b2b65f1

    • SHA1

      d74e46312223d257ca523779e8455bab8e79beaa

    • SHA256

      18d2d9bfd576ced57fbba554b2a0235d33a947a509559439b18f92febf8afa88

    • SHA512

      1d616a2977d50f5426e08736aa14e5c37bb6e919c19aced2b02d87812c59d73749aa2d0de6d9745166e79f45e983af7beca545e18df65b816433d1249651729c

    • SSDEEP

      24576:IOBHs308uOOKdZiT062Nc6aWrzAk2LIP4ylsjM3NVzyYTjMz9:hMPOCZ56MNf4k2o4RjMXDTjMZ

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      cf85183b87314359488b850f9e97a698

    • SHA1

      6b6c790037eec7ebea4d05590359cb4473f19aea

    • SHA256

      3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac

    • SHA512

      fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b

    • SSDEEP

      96:3IsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9oug:YVL7ikJb76BQUoUm+RnyXVYO2RvHoug

    Score
    8/10
    • Downloads MZ/PE file

MITRE ATT&CK Enterprise v15

Tasks