General

  • Target

    cbc5e09082cccbf5f799dde2292169c68ff735e69f0d24b3c151ae02d28c6043

  • Size

    733KB

  • Sample

    250415-dvv92a1vht

  • MD5

    132069ed9690b2c6a105f876f36666f0

  • SHA1

    6a153ff8318a31d74fa70f7824f08ece46894e2b

  • SHA256

    cbc5e09082cccbf5f799dde2292169c68ff735e69f0d24b3c151ae02d28c6043

  • SHA512

    0aa6b97798ebeb3b9cdbb2060767b07f9c237008a200a3b1002abf60713b9a3803cc9394c6c320d7298aa9768a656ca93a7295ad662b8db5fc39cb8e95da8019

  • SSDEEP

    12288:jyrhMOi+S6p9uHqgCAbP8mLdIiSn8u75BAfApqlXow7+oj7WoGZ/CUl3:ChMk9keAbP/dBSnr756ffow7bj6L/CUV

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dhakahome.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    DhakaHome2024

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      TRND 30177542.exe

    • Size

      934KB

    • MD5

      dde9fe062d4ef7d091e43de9ef5270c4

    • SHA1

      b5cd6919b4c7b22e9511d0a0e6097236acf193e7

    • SHA256

      94b6c609559194b9644ca426204de5273b7ceca9fafc9bfb4a822e181dfe2e53

    • SHA512

      216e7ce45205560aac87cd8431d7c613b04e9a6aa4d38a01dacd708ab9d52e8b69be85cb02f5b1cbea825c11ca59ef278b8690329302e91dea33fc6f8ed3fe53

    • SSDEEP

      12288:T5a46qfYik+GpZKd5NQLZq1xZopncR+g+lc4QCwXTcrKg50HW44xvz887yvxg4V:ty+NQZxrwXIk4xb1yvxV

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks