General

  • Target

    SWIFT.zip

  • Size

    676KB

  • Sample

    250328-qlg29swwht

  • MD5

    633c765659549be9d82dffe1ae7230a1

  • SHA1

    734d92321a1861ed456122c694810d3a45735fcc

  • SHA256

    65960e8e90eade93847ff6be4cb9f271c97b69f76e633e1a38fd0230c1ccf911

  • SHA512

    6448afff6f13d769022e9c8bc11909070589da90dea03dba368d4c676e7fc4588e1271a4d9ac2feb733e37e3b00c0ea268d6dbbab091c489308b8dd5ba8ad6d8

  • SSDEEP

    12288:+4qhgPt8rE5ChFr2kn2UvXFpKVaH4HIW1dLapIMU6rbssxy3S4+r26s31ci:+6t8rx2kn2UvXHKoHwIWPO/rbfxy3SLS

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.steadfastlogistics.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    slf@2023

Targets

    • Target

      b5Tu0LaQfn6bnAD.exe

    • Size

      790KB

    • MD5

      5220a44989c88e4d1a573ecaea24056a

    • SHA1

      b5ae001ca25a3ee449d2103fdca87b81d3c67f88

    • SHA256

      ab68d4e831745aa5364ad14203a0a9669a5362913b09263eb4e06681f62007c5

    • SHA512

      f174ff257e076474cbb270bf4933d9fbe93fb75e862fad98bffb12c576ff11a9860df7ecc702f910a288d23d96b9e0f0a3e1e8992b07979cd50b284f96d16f55

    • SSDEEP

      24576:YP9fy9U2kn2Uv6XQbzET5RrNfxi3SLX26s2ZAXtJb:Ylfy9U527XQbgVFyA6t

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks