Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    rpjmGcty94T5Lz6V.exe

  • Size

    749KB

  • Sample

    250325-vm8zlasry9

  • MD5

    f7c3a773d318e5f21c1ff0e03a76c73b

  • SHA1

    f1a06893d12f6e1e8f5ba1cd1c9d183dbb5fb84b

  • SHA256

    0cf9705ea73fa538ec6056e8a35403ad1597ac5986590002bc94064ba004f103

  • SHA512

    92437b6232cba0b652eda75742bc70dbb8f1afc2fe0898abcfb209ec926dc398980ae02ed30586447865e5411a5c7c54b83a9bb9e8e1c484f3444623b87460e9

  • SSDEEP

    12288:xdKtYyOn6nzxzvPGXcIPzenHgzBXW+6fmyvAitNjc9LSobGP+AsSe4y/0F:4Y9n6nxPpcUgj6NxNjLkAsSeT/0F

Malware Config

Extracted

Family

vipkeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.parpalsrl.com.ar
  • Port:
    587
  • Username:
    araceli@parpalsrl.com.ar
  • Password:
    araparpal
  • Email To:
    phillipwhitevirus@gmail.com

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.parpalsrl.com.ar
  • Port:
    587
  • Username:
    araceli@parpalsrl.com.ar
  • Password:
    araparpal

Targets

    • Target

      rpjmGcty94T5Lz6V.exe

    • Size

      749KB

    • MD5

      f7c3a773d318e5f21c1ff0e03a76c73b

    • SHA1

      f1a06893d12f6e1e8f5ba1cd1c9d183dbb5fb84b

    • SHA256

      0cf9705ea73fa538ec6056e8a35403ad1597ac5986590002bc94064ba004f103

    • SHA512

      92437b6232cba0b652eda75742bc70dbb8f1afc2fe0898abcfb209ec926dc398980ae02ed30586447865e5411a5c7c54b83a9bb9e8e1c484f3444623b87460e9

    • SSDEEP

      12288:xdKtYyOn6nzxzvPGXcIPzenHgzBXW+6fmyvAitNjc9LSobGP+AsSe4y/0F:4Y9n6nxPpcUgj6NxNjLkAsSeT/0F

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.