General

  • Target

    ILS0592024DI6408.exe

  • Size

    820KB

  • Sample

    240905-vtthgswfjf

  • MD5

    92ecfa3057b13a3547c3648bb598e35c

  • SHA1

    6f6407e1e4b2902c076788dca65211929a34be2e

  • SHA256

    b1e547ad1c0cf9657a3a531d98fee7bfb93bd86c223f4aeaeafd841c6ae948d8

  • SHA512

    86b4c0911417861dc15544076ab9c7e03045f911201cbc51ee5ed113242505680bf74a9b02b20d3883ae2f2712795b65975ebbb988520c7a9eadac459f35e8ca

  • SSDEEP

    12288:Ge21UoIG5MPUdq/k0kGpk9xDcYnC/0ESJPQTqAwa9w9kAFOu7XouOSZdAZk1jDZf:oUobyIq/k0bmxSUr37Ou7X0SB1j

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      ILS0592024DI6408.exe

    • Size

      820KB

    • MD5

      92ecfa3057b13a3547c3648bb598e35c

    • SHA1

      6f6407e1e4b2902c076788dca65211929a34be2e

    • SHA256

      b1e547ad1c0cf9657a3a531d98fee7bfb93bd86c223f4aeaeafd841c6ae948d8

    • SHA512

      86b4c0911417861dc15544076ab9c7e03045f911201cbc51ee5ed113242505680bf74a9b02b20d3883ae2f2712795b65975ebbb988520c7a9eadac459f35e8ca

    • SSDEEP

      12288:Ge21UoIG5MPUdq/k0kGpk9xDcYnC/0ESJPQTqAwa9w9kAFOu7XouOSZdAZk1jDZf:oUobyIq/k0bmxSUr37Ou7X0SB1j

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks