General

  • Target

    748debce1ac07b044cd4ce916b04225c2aecaf8a742785b9441f652f368cc473.exe

  • Size

    984KB

  • Sample

    250226-d8js6awmy4

  • MD5

    5c6c32f246750f39b4f79aff8e8e3f82

  • SHA1

    5b4a8ef9b9b14c9cab49d1fa9ce44eec788536a1

  • SHA256

    748debce1ac07b044cd4ce916b04225c2aecaf8a742785b9441f652f368cc473

  • SHA512

    8b9503a9f291bac8ec9917d186858a1100191264b836157cc317e485ad4307803c214570972134bde114941d1b0bde1d3b6c7f51535185366cfc2c04f1a56313

  • SSDEEP

    24576:3u6J33O0c+JY5UZ+XC0kGso6Fa17AIG/qW62WY:Ru0c++OCvkGs9Fa17ZGlmY

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ladangharbalenterprise.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    johnson12@

Targets

    • Target

      748debce1ac07b044cd4ce916b04225c2aecaf8a742785b9441f652f368cc473.exe

    • Size

      984KB

    • MD5

      5c6c32f246750f39b4f79aff8e8e3f82

    • SHA1

      5b4a8ef9b9b14c9cab49d1fa9ce44eec788536a1

    • SHA256

      748debce1ac07b044cd4ce916b04225c2aecaf8a742785b9441f652f368cc473

    • SHA512

      8b9503a9f291bac8ec9917d186858a1100191264b836157cc317e485ad4307803c214570972134bde114941d1b0bde1d3b6c7f51535185366cfc2c04f1a56313

    • SSDEEP

      24576:3u6J33O0c+JY5UZ+XC0kGso6Fa17AIG/qW62WY:Ru0c++OCvkGs9Fa17ZGlmY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks