General

  • Target

    26022025_0637_8391104.exe.iso

  • Size

    818KB

  • Sample

    250226-hhy8dawkz8

  • MD5

    9000590e297e770167152df4919bcf22

  • SHA1

    f9725eb413d8d0b1a6592a47db95e6ec35a77c4d

  • SHA256

    a4bfdf1399ae2040899e457add172c8173ad1595bf14ca6536669d5c0e66fc3a

  • SHA512

    5d8460198989722d652208dee851e7bbb8156a3ab27cd56adea453fbc7227a9262869cba1206a7487606f4375674e4a37f96d10dfdf831f00de586b6b01145c4

  • SSDEEP

    12288:Ck383le9ciHHsOGOXzLfLw+zQ9n10wJJCkItJO9YRmJAHBUgQFlx02KJHtJp1g+:CW3NSOXzLTm+wiHtF+CBdCl22K9Hg+

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    C$f)cMq8

Targets

    • Target

      8391104.exe

    • Size

      758KB

    • MD5

      50afdccb067af3ab7d20942e7bfc900a

    • SHA1

      3d4e821d0a4e22efb13840a8df9febb7cb2e93de

    • SHA256

      5e27c8b30586c5da69dab625c07db9ef9750213c1ea0053e35f62c098570d187

    • SHA512

      9b015501b7c4c316f1d0f05d5872db7dbb5e093a23e3addb309ed8cc7c6a540b923c3c06c309b6d538eb5a219c89d9cde24e87164a786fbdbd275acde7ac9cc8

    • SSDEEP

      12288:jk383le9ciHHsOGOXzLfLw+zQ9n10wJJCkItJO9YRmJAHBUgQFlx02KJHtJp1g+:jW3NSOXzLTm+wiHtF+CBdCl22K9Hg+

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks