Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    013f695b5ec6d00214cc5835bb446a73382871e90cb17c6d8922c3b3ef7484c5.exe

  • Size

    858KB

  • Sample

    240821-kwxb2szcqe

  • MD5

    b350cd206fef3c85b464eb38c0aa7a6e

  • SHA1

    f69d2ad78ae1efa4aa9f1f67947972e54c340484

  • SHA256

    013f695b5ec6d00214cc5835bb446a73382871e90cb17c6d8922c3b3ef7484c5

  • SHA512

    a407aaa7d26de6dfa1b0a6f05ef4d521b4ca146a27bbca4b2c17acdd86062cbca2e3c9559690b16969c01ec0b6e4bae62f462603e59b01e7844a0db70db6aaab

  • SSDEEP

    24576:S296h1OwaxiPuSNlpmVY2eInJYAP0e+8DYhuqG:l988zSNlpmVY2bRPb+Lhur

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      013f695b5ec6d00214cc5835bb446a73382871e90cb17c6d8922c3b3ef7484c5.exe

    • Size

      858KB

    • MD5

      b350cd206fef3c85b464eb38c0aa7a6e

    • SHA1

      f69d2ad78ae1efa4aa9f1f67947972e54c340484

    • SHA256

      013f695b5ec6d00214cc5835bb446a73382871e90cb17c6d8922c3b3ef7484c5

    • SHA512

      a407aaa7d26de6dfa1b0a6f05ef4d521b4ca146a27bbca4b2c17acdd86062cbca2e3c9559690b16969c01ec0b6e4bae62f462603e59b01e7844a0db70db6aaab

    • SSDEEP

      24576:S296h1OwaxiPuSNlpmVY2eInJYAP0e+8DYhuqG:l988zSNlpmVY2bRPb+Lhur

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks