General
-
Target
02cbe218509db2fc3e814bd6bf5cd159e59e42318bf72e13a56432cdece2d463.rar
-
Size
1.1MB
-
Sample
250213-claras1mhm
-
MD5
499a24731845f4f612f15e57cd7145fa
-
SHA1
591e6420a02dc75a802ff213f259ac5c41759430
-
SHA256
02cbe218509db2fc3e814bd6bf5cd159e59e42318bf72e13a56432cdece2d463
-
SHA512
779f4e5227297654b3ee0caecce9e7d011d597e3b76c3a457fe1cf056890eb6ef27358c8744492349f02b1cc1b6eefabfb2ac41a8116a8c81ffcbd0917ece3d9
-
SSDEEP
24576:yfZp/6LJ+vXkCPCEJTW/F4AchuKOqzX0x31AOVMH+xYoesTH2H7:ySLJylzWtbMOg8FAOOOHxHU
Static task
static1
Behavioral task
behavioral1
Sample
dhl.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
dhl.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250207-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.kuattrode.hn - Port:
587 - Username:
[email protected] - Password:
qzN$t-TB#R - Email To:
[email protected]
Targets
-
-
Target
dhl.exe
-
Size
1.2MB
-
MD5
c05369e8d3a9d0853cf1887e4b2b65f1
-
SHA1
d74e46312223d257ca523779e8455bab8e79beaa
-
SHA256
18d2d9bfd576ced57fbba554b2a0235d33a947a509559439b18f92febf8afa88
-
SHA512
1d616a2977d50f5426e08736aa14e5c37bb6e919c19aced2b02d87812c59d73749aa2d0de6d9745166e79f45e983af7beca545e18df65b816433d1249651729c
-
SSDEEP
24576:IOBHs308uOOKdZiT062Nc6aWrzAk2LIP4ylsjM3NVzyYTjMz9:hMPOCZ56MNf4k2o4RjMXDTjMZ
-
Guloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
cf85183b87314359488b850f9e97a698
-
SHA1
6b6c790037eec7ebea4d05590359cb4473f19aea
-
SHA256
3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac
-
SHA512
fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b
-
SSDEEP
96:3IsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9oug:YVL7ikJb76BQUoUm+RnyXVYO2RvHoug
Score8/10-
Downloads MZ/PE file
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2