Overview
overview
10Static
static
3BugSplat64.dll
windows7-x64
10BugSplat64.dll
windows10-2004-x64
10PO202501B.exe
windows7-x64
10PO202501B.exe
windows10-2004-x64
10vcruntime140.dll
windows7-x64
1vcruntime140.dll
windows10-2004-x64
8vcruntime140_1.dll
windows7-x64
1vcruntime140_1.dll
windows10-2004-x64
8vcruntime211.dll
windows7-x64
1vcruntime211.dll
windows10-2004-x64
8General
-
Target
PO202501B.zip
-
Size
2.6MB
-
Sample
250215-mb3z7sxrbq
-
MD5
35b0df25976ae1b2ed2eb64ce4967e09
-
SHA1
24c06b8a23e0189f57b0df8af06c25374a10c51b
-
SHA256
58d95f19639cc6d5acb02511b4c9a8fe04ca63d63844b68036dbc0eea4edd453
-
SHA512
8e4acedcbaebf88e1dd004b4d89f33b9faefe0aec0c09ffe011a0d436ccfa498d8b8d69a5a4cfd1ded5a7a5e7c647d513f05300a05922c74bdaad42e55ea920f
-
SSDEEP
49152:N01cBpjDsibTtExdGCot6tkm5xBQ/UhXJOhafW5+KhcZxWIu8JIltW1+:NjXjwijCot6tkmq/8JOhafYhSxdu8u
Static task
static1
Behavioral task
behavioral1
Sample
BugSplat64.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
BugSplat64.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
PO202501B.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
PO202501B.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
vcruntime140.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
vcruntime140.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral7
Sample
vcruntime140_1.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
vcruntime140_1.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
vcruntime211.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
vcruntime211.dll
Resource
win10v2004-20250207-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
webmail.tropicnet.com.au - Port:
587 - Username:
[email protected] - Password:
Millymoo!@# - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
webmail.tropicnet.com.au - Port:
587 - Username:
[email protected] - Password:
Millymoo!@#
Targets
-
-
Target
BugSplat64.dll
-
Size
4.5MB
-
MD5
dbf393cb8382e127c0008d51a135e8b8
-
SHA1
1c3210ac7e1ca2026b5ab91299e5d7b56813d115
-
SHA256
b611edd23fc7313e409a4538752a6bfd274cc79b4b87a8700c39fbdc223deb87
-
SHA512
4339fa259ba6a7488af2508968ae8e62cd7c0c9c7d5c7f1022f4e0ca30d87e4ffd78c77b6483a8afd944e7609740ecdc3edc6e698c0ed9bc3412549dc9589cf5
-
SSDEEP
49152:kRamKgxNsrgLIEdPGU9ZHfh6wZrzj81gRUaGJSA9g+CSIBGKKBUMPmPrbrzme1YL:jmK0srWlhpmSA9g3rrrA
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
PO202501B.exe
-
Size
255KB
-
MD5
2a39ab7049226dec986fa602a26f5372
-
SHA1
f0baf3b4f1dbcc6dd21e6f1279c741c0051c03cc
-
SHA256
ad4cd780bd7accd7482dcf6222910aafee971c7ab870ebae0022d51b237fa5cb
-
SHA512
5190d06d07b72f8ebaf326b6c0fcd85963afe598be499afee11881905ded944b58829a6ddc85a94f75621e5936496e151a1d8b4b96d12d38148a1f256841dafa
-
SSDEEP
6144:WIaCAK/UGjgTPD/CRe4GvTS8w9hzc9ap+zGj:hz7KmH9tp1
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
vcruntime140.dll
-
Size
84KB
-
MD5
3e746699828f9e9aab45b8f1c3cea4a1
-
SHA1
5ba84f26e47670c865e21e3303a28e54608475d3
-
SHA256
de6ca787d0e0a30810fea570db867199d32ed71867e1c36a0f58ed71d540f035
-
SHA512
ecc2c06a96661f063bbce91c5a7239e24aae3a5924ebb8773cef3d9e1d332959612bd052991ace98700d25912266ee39ee93ab623befd20f548d62f451426218
-
SSDEEP
1536:ca0fOoqCbITyAAAmYIihE7Ka8maPKMOB0Fc2/ecbQ7qdWdi/phl:cnTbuyAzhphgLcBOGFxecbQ7qSi/t
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
-
-
Target
vcruntime140_1.dll
-
Size
35KB
-
MD5
f124d735ebff3330b5b6cfa7df1c17be
-
SHA1
ad9cba122a47a4be8c3ec3ac6ce2d920f7e40baa
-
SHA256
d34288fcb286d4e2056f969767a65f09cf6e71ad27fe3af4edd1584cd95fd55f
-
SHA512
e5f1fd40b28861f3f7e5851e47b60a3035216129e0491f112e8ebc4dacd4c890a06caead8aa7d4ae7b64bd2b0c08e1ba17bad924534fcedec406895ca8af8c09
-
SSDEEP
384:lbPvL6j8qS3RZ0IQ8tq7+B5Wjfy4hGCrNWrSVbWENXfGj5y85xIam4WrNNW7QHRV:BvGj8qSBoEiy4hvCsjNveIamvW8JuW
Score8/10-
Downloads MZ/PE file
-
-
-
Target
vcruntime211.dll
-
Size
370KB
-
MD5
c982637d4aef31b1601b7b514b2c8c0e
-
SHA1
e39b8808652bf18fcb5acaf95a3eb30e6dfca7fe
-
SHA256
1c9ac2b15cf274154a7c2fcc881f01762fc5e863c4c2889a7c0140b00fb4298d
-
SHA512
c2617c0157b8f4e8d0bf22f44556fe0239c8b25b8088d618c4616d6e4333a0bcaf0fe319e74151f1e95000fd6d3d4139e73395ea852b42a114a852167a1a1f9a
-
SSDEEP
6144:TR6TkMuEHjtF5x5eABTmTugfvrYQtNS2NlQ+Jv3+x4pmipLzKOpVVRDDYX:TR6TkMuEHjtF5x5uuO9TXUypxHp1QX
Score8/10-
Downloads MZ/PE file
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1