General

  • Target

    e51a0edac8461634407a7de45624ade39c759fd926ed31ba8fb3afdf71911f00.exe

  • Size

    516KB

  • Sample

    240903-da4qnswgjc

  • MD5

    779970020c448f1cfd7d6f990e829eef

  • SHA1

    e537367219669ad71dd2e562559ee6b220e6fb79

  • SHA256

    e51a0edac8461634407a7de45624ade39c759fd926ed31ba8fb3afdf71911f00

  • SHA512

    0315496aa84476d643e2142040557a55a1af7785160c14fcfe2cd0269d18fc10a53e47e3004b5f2bcda198dcad393ca577ac0c85483ab90f39b93017ee98e115

  • SSDEEP

    12288:Wt33/rPyAdPKz5bM3QH0zTYCbeN847ucmcHAlcQgOQ:WxTaAXk0zS847uchgeQBQ

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      e51a0edac8461634407a7de45624ade39c759fd926ed31ba8fb3afdf71911f00.exe

    • Size

      516KB

    • MD5

      779970020c448f1cfd7d6f990e829eef

    • SHA1

      e537367219669ad71dd2e562559ee6b220e6fb79

    • SHA256

      e51a0edac8461634407a7de45624ade39c759fd926ed31ba8fb3afdf71911f00

    • SHA512

      0315496aa84476d643e2142040557a55a1af7785160c14fcfe2cd0269d18fc10a53e47e3004b5f2bcda198dcad393ca577ac0c85483ab90f39b93017ee98e115

    • SSDEEP

      12288:Wt33/rPyAdPKz5bM3QH0zTYCbeN847ucmcHAlcQgOQ:WxTaAXk0zS847uchgeQBQ

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks