General

  • Target

    Minty.exe

  • Size

    1.1MB

  • Sample

    250224-yd4v3a1nt9

  • MD5

    0655e0d2ba0e2e1c6dff3fc641df6e51

  • SHA1

    a59607c3c85aefe38a9b1120f62cd9068eb40a57

  • SHA256

    86f314ed376d8d0f2b6d6a99cbd54a05d536d13fb76d163243198253b12e5f54

  • SHA512

    b9e9a1d2db29b756d0fa85b01e4af65c53069715ee45d4f83b29f85c06deb946dd00020591d370ac6d6689f6f1f1d5fcb5b524f59f9ef6ad9f4d5a3da85ea7b9

  • SSDEEP

    24576:yjl8n94KG/k6Jw4odKq3ry+HNU7OIdzkLa:mKnex/kIteKgHNUlV8a

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7745751910:AAGY46QDCTWO_Pw9iDqZhkNij-i4uwbMgzE/sendMessage?chat_id=7695061973

Targets

    • Target

      Minty.exe

    • Size

      1.1MB

    • MD5

      0655e0d2ba0e2e1c6dff3fc641df6e51

    • SHA1

      a59607c3c85aefe38a9b1120f62cd9068eb40a57

    • SHA256

      86f314ed376d8d0f2b6d6a99cbd54a05d536d13fb76d163243198253b12e5f54

    • SHA512

      b9e9a1d2db29b756d0fa85b01e4af65c53069715ee45d4f83b29f85c06deb946dd00020591d370ac6d6689f6f1f1d5fcb5b524f59f9ef6ad9f4d5a3da85ea7b9

    • SSDEEP

      24576:yjl8n94KG/k6Jw4odKq3ry+HNU7OIdzkLa:mKnex/kIteKgHNUlV8a

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      c61501f07cf09bcfcdfe4cc8a1ebbbe3

    • SHA1

      e8581b4359651b857646ae727efaaef372daa0fc

    • SHA256

      7e75f148920db6300dad5a1c12fd5d6eecc95698a310a01311181bc98a704d55

    • SHA512

      9837abe7ec3fa0f1f5193968d12b7ca1893e34eddf628db1f7ab6715b4de339231f0ec1b5f0f86c767f5a30c40da5c4a95e99deedd22eece93cb0d00539aad24

    • SSDEEP

      192:Kk09rQDenC9VrcK7REgSWOprANupQYLRszDDH/d9CWlXo7U6Wxf:Kk0JQEaVAK7R9SfpjpQYLRszfH/d9CWv

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks