General

  • Target

    INQS_RFQ441632-A_Shenle_Corporatin_Matrials_productions.exe

  • Size

    836KB

  • Sample

    250219-jyb88atjz6

  • MD5

    379881c017323bbb89ba4617d0d3df7c

  • SHA1

    a57be5d3ca8e6410f411cbb8582334601e15c479

  • SHA256

    58c1bb1c19cd551261465044f769a313549a574a345a2754414e48f8fc08bcbf

  • SHA512

    01990e00bfaaffd16488f36ff0bf894134d6203d671652937bbcb264db2dadd89dfcb057dae26f1c883bab17cd20dc948e015876b16ee1116b850ba9bd6b5e33

  • SSDEEP

    12288:YPqbnb4/ZPEYrwzaNpKMJiQ/h0ivfGWQYFrsNyRCURjmqzGLYtCGZAX/L+lkR:Dg2ogH9NxURiqzfVGX/LZ

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.tmcksa.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    smartyok4#

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      INQS_RFQ441632-A_Shenle_Corporatin_Matrials_productions.exe

    • Size

      836KB

    • MD5

      379881c017323bbb89ba4617d0d3df7c

    • SHA1

      a57be5d3ca8e6410f411cbb8582334601e15c479

    • SHA256

      58c1bb1c19cd551261465044f769a313549a574a345a2754414e48f8fc08bcbf

    • SHA512

      01990e00bfaaffd16488f36ff0bf894134d6203d671652937bbcb264db2dadd89dfcb057dae26f1c883bab17cd20dc948e015876b16ee1116b850ba9bd6b5e33

    • SSDEEP

      12288:YPqbnb4/ZPEYrwzaNpKMJiQ/h0ivfGWQYFrsNyRCURjmqzGLYtCGZAX/L+lkR:Dg2ogH9NxURiqzfVGX/LZ

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks