General
-
Target
facturar.exe
-
Size
781KB
-
Sample
250217-ny8pmszk12
-
MD5
dc6405171400ba31490159b7e59eae0b
-
SHA1
59ac7ab360bda219ab6aa5b8b57fd5d3a1f7ec73
-
SHA256
8e533c355130e312b4bdecd237c49d50cf8d12c5f88fbe991ecaac462f84c9a6
-
SHA512
15944b966bad130dece39b2b958073b5c63806f8f8441e193af481c2349bd896d2f599bc9dc82ca4a5233802d225245ea5e1b459a6c9033485189be7a7a7ba08
-
SSDEEP
12288:2tlyuHaQfKrVOnQlp6UV/ytzlI/Xr+urZTbq9pK0R6iyNc3pipkyfGSN:AbQknM6UJylurZTG9pK+65c5yfFN
Static task
static1
Behavioral task
behavioral1
Sample
facturar.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
facturar.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
dydsmnstres.ps1
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
dydsmnstres.ps1
Resource
win10v2004-20250211-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.novacitacor.pt - Port:
587 - Username:
[email protected] - Password:
#Novasystem123# - Email To:
[email protected]
https://api.telegram.org/bot8065011306:AAGGqcKWP-Xh6cM1C2XjGGRyWEn_Dwu0gBc/sendMessage?chat_id=6096718960
Targets
-
-
Target
facturar.exe
-
Size
781KB
-
MD5
dc6405171400ba31490159b7e59eae0b
-
SHA1
59ac7ab360bda219ab6aa5b8b57fd5d3a1f7ec73
-
SHA256
8e533c355130e312b4bdecd237c49d50cf8d12c5f88fbe991ecaac462f84c9a6
-
SHA512
15944b966bad130dece39b2b958073b5c63806f8f8441e193af481c2349bd896d2f599bc9dc82ca4a5233802d225245ea5e1b459a6c9033485189be7a7a7ba08
-
SSDEEP
12288:2tlyuHaQfKrVOnQlp6UV/ytzlI/Xr+urZTbq9pK0R6iyNc3pipkyfGSN:AbQknM6UJylurZTG9pK+65c5yfFN
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
dydsmnstres.Akk
-
Size
51KB
-
MD5
6875aced8bc3c45045c03780bcf82992
-
SHA1
6be537d374bfe83e5d563344a047a76519e149bf
-
SHA256
58c38113bea6b0e3310ff986103d948b0c0e149c75f4332afc5d40d515ed2642
-
SHA512
060f041e007fb1405927503858b1cdbb7670f9129df2f39157691291cc57080d24a737a6e65bd87852ab276e85cfbc727d7084fcc7b8a1e4b026e745357c2c0d
-
SSDEEP
1536:KbdwoGcteJbVhMEjCMpY9olnnNf+/8V0jTq:l7xVCEVpY9qnNf+/kP
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1