General

  • Target

    25022025_0703_24022025_Payment Swift Copy.zip

  • Size

    744KB

  • Sample

    250225-ht48rsvpw2

  • MD5

    fac4526057902d472ab24eac0c079c25

  • SHA1

    686a8a09cf443482c3839a63ce3a64ac59289abc

  • SHA256

    d5690795b3b867c2a7b42ccf8ce1d8a49bc68e60c55ef573054457d8ccf97460

  • SHA512

    203c7da62cd45621b79620025bfd75f11b3ee8d0080e2262ec0eaea8e2ba1adc1a2d449127a6051ee031dda5be3e530c3c66091e42bbc40cc89842a28209af63

  • SSDEEP

    12288:HXHS5djK02jgjlv0flDdFxrmsck5vqGCyyb5UWE5P9qaG5baLC6s1ccSOqo4DX52:HXS602jgjytX9mscfb5FO9qaG5KzXcSE

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ifSg^KL6

Targets

    • Target

      Payment Swift Copy.pif

    • Size

      890KB

    • MD5

      d289e495195c9e64539e604e037762ac

    • SHA1

      6651238d349b1657a78fd921f1f55e4d38cce9e3

    • SHA256

      c4e0167682813d15e807830fd194456713d3d4c155ec8613d3f588e55e8a6d7b

    • SHA512

      8ba6be9ec42fca233696ad0d21ae95b722d67a524a533fed60e2fa5235f0a00c763f5be3a26dd8172293073ef958273147fae27e4e777fe218fb78d7c468e774

    • SSDEEP

      24576:WRteh9ZIby7BxeAchjtNefGaG5YtLo4DFpLf8U:WRtehLH7LchCJtLPFqU

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks