General

  • Target

    INQUIRYS87636_5_PACKAGING_VIET_NAM.exe

  • Size

    793KB

  • Sample

    250217-nv55cazky9

  • MD5

    e4df82ce8dc093a24fafe4091083f575

  • SHA1

    f5e0a86185001ea17a47bd87974388bf1acf4dd1

  • SHA256

    f5c2ca5c0224f07b3379faeb4d38d468e3266a939731a540700265568c5ee5a6

  • SHA512

    6a0a2e726942782a77a48206bcb46c152cbd00844b809b1e42805e40aa1642367d6c6ee072113b250b58626c2835a708e2e15b06546bc30405352ac8a68997b1

  • SSDEEP

    12288:+xgmP3PkrD+hZfVDdfk6UvpNVLmXNp5nzmCL/Z60hFqoOm034h4r4xmcks1YGkR:apsP+hDx8NVLeNp5zJ625EbrGm7Nd

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.tmcksa.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    smartyok4#

Targets

    • Target

      INQUIRYS87636_5_PACKAGING_VIET_NAM.exe

    • Size

      793KB

    • MD5

      e4df82ce8dc093a24fafe4091083f575

    • SHA1

      f5e0a86185001ea17a47bd87974388bf1acf4dd1

    • SHA256

      f5c2ca5c0224f07b3379faeb4d38d468e3266a939731a540700265568c5ee5a6

    • SHA512

      6a0a2e726942782a77a48206bcb46c152cbd00844b809b1e42805e40aa1642367d6c6ee072113b250b58626c2835a708e2e15b06546bc30405352ac8a68997b1

    • SSDEEP

      12288:+xgmP3PkrD+hZfVDdfk6UvpNVLmXNp5nzmCL/Z60hFqoOm034h4r4xmcks1YGkR:apsP+hDx8NVLeNp5zJ625EbrGm7Nd

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks