General

  • Target

    0e2ce00e002ee4a25c0a888788de2fcafab8d293fb034163bb3e1bf34151c452N.exe

  • Size

    1015KB

  • Sample

    250216-byfbwavmer

  • MD5

    d07f1dd60d7c6a11ab0d160a8314bb40

  • SHA1

    8d736d69695fc4c47b3c4d0f31699afc21d86a9c

  • SHA256

    0e2ce00e002ee4a25c0a888788de2fcafab8d293fb034163bb3e1bf34151c452

  • SHA512

    c4d3ae8f37319533a484bb35d8de249f98cf533cde13d1a197832765b4563e93c1dc9e4ee297049e4b28cb5ab9821ff96fb79706c7f13693754e77dddfbffe8c

  • SSDEEP

    24576:xu6J33O0c+JY5UZ+XC0kGso6FaK1OL5kiWY:ju0c++OCvkGs9FaUOL5MY

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.mydinteriors.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    45P6XWNA5DV3

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      0e2ce00e002ee4a25c0a888788de2fcafab8d293fb034163bb3e1bf34151c452N.exe

    • Size

      1015KB

    • MD5

      d07f1dd60d7c6a11ab0d160a8314bb40

    • SHA1

      8d736d69695fc4c47b3c4d0f31699afc21d86a9c

    • SHA256

      0e2ce00e002ee4a25c0a888788de2fcafab8d293fb034163bb3e1bf34151c452

    • SHA512

      c4d3ae8f37319533a484bb35d8de249f98cf533cde13d1a197832765b4563e93c1dc9e4ee297049e4b28cb5ab9821ff96fb79706c7f13693754e77dddfbffe8c

    • SSDEEP

      24576:xu6J33O0c+JY5UZ+XC0kGso6FaK1OL5kiWY:ju0c++OCvkGs9FaUOL5MY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Downloads MZ/PE file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks