General

  • Target

    swift_____.rar

  • Size

    686KB

  • Sample

    250328-sfsypazjy5

  • MD5

    e228466f3c99e63483a4b58f95661582

  • SHA1

    642e298a9e3b6fe4dc5f8de3bc24f6290c1e16ce

  • SHA256

    a00984beafc2ba1344ed0591dc8a0426e331f97c0eed001463488cc57d3a85b8

  • SHA512

    ec40057bb313a77217c0dd9cb7c7fe30bdbe0d567808879e594a8717f9bee59f3e64ac14e9b3d51af16647784d4a98814d7105d37787d38e0661325b7c538875

  • SSDEEP

    12288:BlU4mBxIUHJwt9UTpqFf2ER3tPhJAj3cmDFS7+3kCbWEq7NYsl+8D3BD8SWQZ5yk:P3mBxIfUN02EHPADtRA+3VWDxY6+8Dxh

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      swift_____.exe

    • Size

      734KB

    • MD5

      9f733c141f4f78ac2644834200fd43b4

    • SHA1

      10f1a56256f872acc61d821916f6896179e3d250

    • SHA256

      64fa1206bbcea92b9972cf15fc10e42fd87170087262ebc56a0fb8573488c163

    • SHA512

      601e20d772940dc77e23fb1a10645f723dcbc12b450c0f3b2434509c650342f9dfffd0decc3403052b1c3ccb814f0aaf6b8d7b8ba179bda55983078d7bc71bc9

    • SSDEEP

      12288:88QiKaxkuR+KbvJcI8mJHkgfMxqQKHvD/GpsEt3+eFCYoZFBuGLwQAH:XQiOu1TJ78YkgU8QKLeCjZHNm

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks