General

  • Target

    ad1f6d21f02c055a25bc71918b15c4fc7e01f3af532fffc3afa1cf3884994b31

  • Size

    590KB

  • Sample

    250219-tdv6pstpbz

  • MD5

    68daa75bc4550df3582283e8a859a7a3

  • SHA1

    c780a1740f0adb8afaa3a251d04532f0570e3bca

  • SHA256

    ad1f6d21f02c055a25bc71918b15c4fc7e01f3af532fffc3afa1cf3884994b31

  • SHA512

    4e3c8b17986b2b77a06d12e5fea478ff54035a44d6f032628688c78af6a699f998b881a848278f65068c7a1ae31587e15484c85f432e287e7fc6154d5d604480

  • SSDEEP

    12288:vpkIbbMzL1mR2vChPeHkcdjHhZ+Nbikc17GStVm7cVpw7I:vLbKNv0Ikat4N+/7GStVT1

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.Vibsens.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    11674455Majid

Targets

    • Target

      No. 623123.exe

    • Size

      1008KB

    • MD5

      64c4c04808fba22a4369dc7dfffd6855

    • SHA1

      c940743caa8119de9107bdb261fa2348e6ed6a41

    • SHA256

      e870a692b92ae1edf5ed5282a4fb15b856f6b40d5e06da8a9df825a3f1951b09

    • SHA512

      f08feabaaa5d0e52da126e57704a7531f96b808eca0eefa34a96f7396c76ab9c10184d2f1089cfb9308193d9c9b5eb80f1007a0cf0551f480b3f66b1f43b60df

    • SSDEEP

      24576:Qu6J33O0c+JY5UZ+XC0kGso6FabFGyv3hrRWY:au0c++OCvkGs9FabIypIY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks