General

  • Target

    Euro35699.exe

  • Size

    776KB

  • Sample

    250414-nnwmbswls9

  • MD5

    7ca1bb368fd2903f3d5e987176b5c99e

  • SHA1

    56ee1cdf36f5a27d8161b5735bdb56b6d5676494

  • SHA256

    c0834472538b4521860ce0d38b7fb302e06da7fb0f328d2ce1614b176b44f5f9

  • SHA512

    f673b47a9d808e272e95fc6bd08504f21b60ef7238925b2894056d328333a62d392244dc2f9074f9995eb771f23507320431fcd77ad9106584ea267e255df23a

  • SSDEEP

    12288:bt+Gilaay84PIEbUjXOhMiCDGxOX5n5YkvU+qVJMuxP1/LKErkjzRqpLkHoVr:bqlaVwEbUuSD7ikvUpAU1aNaYIVr

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dhakahome.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    DhakaHome2024

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Euro35699.exe

    • Size

      776KB

    • MD5

      7ca1bb368fd2903f3d5e987176b5c99e

    • SHA1

      56ee1cdf36f5a27d8161b5735bdb56b6d5676494

    • SHA256

      c0834472538b4521860ce0d38b7fb302e06da7fb0f328d2ce1614b176b44f5f9

    • SHA512

      f673b47a9d808e272e95fc6bd08504f21b60ef7238925b2894056d328333a62d392244dc2f9074f9995eb771f23507320431fcd77ad9106584ea267e255df23a

    • SSDEEP

      12288:bt+Gilaay84PIEbUjXOhMiCDGxOX5n5YkvU+qVJMuxP1/LKErkjzRqpLkHoVr:bqlaVwEbUuSD7ikvUpAU1aNaYIVr

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks