General

  • Target

    CamScanner02-18-20250535.7z

  • Size

    36KB

  • Sample

    250218-sehrbstlz9

  • MD5

    5f5f4475b677ef79f03c92b79c022ae3

  • SHA1

    ae4e417bc04f4d9a207a31d7b7655245d7cc07e3

  • SHA256

    47c3b0014cc31b4af6bb864d5d0b55b365d173d1328be50d3cddb5bf5aedda8b

  • SHA512

    c649eb39db5a5daf378505d593f6deaff7889f4145a017091861628f1bf44544134192d5105aec8937f4094c485b8d39427da02034802bd33c199e18fc2c05b3

  • SSDEEP

    768:sAunhRniKnaNRavo3lVmmIPfjSl1VvoRRVePGMZtRZvh0vjLVPA:sAEhZDajVVmmIPLSl1VotATvhOVPA

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://3005.filemail.com/api/file/get?filekey=nIx_5T0LxHOBjilNb9CRviabPjrW2dlC-LxeOdJPF_Z_1MP6CuQBS5KcptA&pk_vid=342803d1cc4e3b801739359203b5fe9d

exe.dropper

https://3005.filemail.com/api/file/get?filekey=nIx_5T0LxHOBjilNb9CRviabPjrW2dlC-LxeOdJPF_Z_1MP6CuQBS5KcptA&pk_vid=342803d1cc4e3b801739359203b5fe9d

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    142.171.169.81
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    !z34db8K4

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      CamScanner 02-18-20250535.js

    • Size

      311KB

    • MD5

      0de9fff98db3ba4094c5aa81d6c67423

    • SHA1

      c1350fa5569ad8d00231da2cde9955c34757fba5

    • SHA256

      554b9322949c5330f897d744e542da4d8db44ec6b193ed36374c386fb8cdb0c0

    • SHA512

      1fe18f132389031057617a771dd0aab9fce470156eae586d607da651d7506f8e6d51ba432149db749fd614a58873262fbfae1bc132e10f7b14f1bcdb700a3703

    • SSDEEP

      3072:5vJ5HovJ5HovJ5HovJ5H7vJ5HovJ5HovJ5HovJ5H4vJ5HovJ5HovJ5HovJ5HRbUj:soYfL

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks