General

  • Target

    29fc4ec2272e265faf58a71365d463e953c20dcfa192b6208a1fd6ddd25a7f11.exe

  • Size

    911KB

  • Sample

    240821-lz3hxasbnf

  • MD5

    cb9c9a8f464afaf501e9612103d8fec0

  • SHA1

    60c819437a659cd38061f64d223ce9c8ddee7b73

  • SHA256

    29fc4ec2272e265faf58a71365d463e953c20dcfa192b6208a1fd6ddd25a7f11

  • SHA512

    286dc10dc0d4ff74583df25f675468f4c6475f7b6ce1b59e1c700f19a698c57902edec75dc1fd464adfae739a22420fdeb6f981ec1583dd71b6393e9252ebfb4

  • SSDEEP

    24576:3ACoC/qaSuzK9vjattZton323zLqksvO2/blP6RSmICTO:IiUueotZtu3kUvOmbV6RrICTO

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7025541570:AAHHRvlJK1bIRktP0rY6GjgOuBxMeTOu_OU/sendMessage?chat_id=5138702702

Targets

    • Target

      29fc4ec2272e265faf58a71365d463e953c20dcfa192b6208a1fd6ddd25a7f11.exe

    • Size

      911KB

    • MD5

      cb9c9a8f464afaf501e9612103d8fec0

    • SHA1

      60c819437a659cd38061f64d223ce9c8ddee7b73

    • SHA256

      29fc4ec2272e265faf58a71365d463e953c20dcfa192b6208a1fd6ddd25a7f11

    • SHA512

      286dc10dc0d4ff74583df25f675468f4c6475f7b6ce1b59e1c700f19a698c57902edec75dc1fd464adfae739a22420fdeb6f981ec1583dd71b6393e9252ebfb4

    • SSDEEP

      24576:3ACoC/qaSuzK9vjattZton323zLqksvO2/blP6RSmICTO:IiUueotZtu3kUvOmbV6RrICTO

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks