General

  • Target

    BL-COPY.zip

  • Size

    784KB

  • Sample

    250328-qlgrhaykt9

  • MD5

    f2c511e5eebf478e3e8b7f95deff8c06

  • SHA1

    a78a85341afff4683070689b93db06d786d51d82

  • SHA256

    62a3ec5ea4d5c9942a989113a3e144426bfa3fa61482ecb2e727f4a788b1043e

  • SHA512

    716cd557268e818a5b4b7acd9a6c406db1c1aa9b1fae2ee90f93381ee5e5a91c377a44f55c27e4f361470f10144b12be99785a0fe7523bff823d1d3473134caf

  • SSDEEP

    24576:QcFAdlLJf3/4sCh3DY9uA6aqyhJw741/fsIYIeWjj:VAjhfCVDqLwCYIl/

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.steadfastlogistics.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    slf@2023

Targets

    • Target

      bEXN0tpyU41jdD0.exe

    • Size

      864KB

    • MD5

      25b7cb7a62555ef3aaa7ecae00c8decd

    • SHA1

      a2421f5e2ae3aa20b8d11fc3076cea2400c68299

    • SHA256

      867af082ab5f5e7468aab5bca97063c60877f44c2d39c0ad02f1a1e721c92260

    • SHA512

      c7c7eeed71df83807cf9d584ee913e4661ccd7d921139a381ce4c17479420683f5ece7aa37b618d4162f39bde11c3bb2bf44fe906e9794f7d3ae0faa6c119f1b

    • SSDEEP

      24576:pg5n6cf13/iyC9LDY9uAKwOy39S741VxsUYI2f:pgB6KRCxDitSiYIU

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks