General

  • Target

    MARINE HONESTY VESSEL'S DETAILS.docx.scr.exe

  • Size

    660KB

  • Sample

    240909-dvrlvayfrr

  • MD5

    2e05ef1ca6f23f31b9acc114af4817bf

  • SHA1

    7d7a15dd1c8ae054e2c5648b6a41ca24772eef68

  • SHA256

    1c4b54493e98c626c67b4c95d6b28fc89e09ce9f448b8746ff61e60117afdb27

  • SHA512

    a0cc66aa345eddd11fdc41ab9eaf01466c3edc807a2bae10e9242e3bbc1ffa892f3aab9ac1c1b804084498683999293e888fc19c3e2c6a00411a6d36ba9cdf5e

  • SSDEEP

    12288:1htcHtwlBShWk16jQk/aR4sKVLeH6j+N9qmOKm7Gl96PbEi9i72l:b2HtwlaWk1gTsKoH+29q4GGl967kE

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7035334332:AAE8zHVleqNNXM6N6AzSZcjppZY2-hFR4fQ/sendMessage?chat_id=5229075943

Targets

    • Target

      MARINE HONESTY VESSEL'S DETAILS.docx.scr.exe

    • Size

      660KB

    • MD5

      2e05ef1ca6f23f31b9acc114af4817bf

    • SHA1

      7d7a15dd1c8ae054e2c5648b6a41ca24772eef68

    • SHA256

      1c4b54493e98c626c67b4c95d6b28fc89e09ce9f448b8746ff61e60117afdb27

    • SHA512

      a0cc66aa345eddd11fdc41ab9eaf01466c3edc807a2bae10e9242e3bbc1ffa892f3aab9ac1c1b804084498683999293e888fc19c3e2c6a00411a6d36ba9cdf5e

    • SSDEEP

      12288:1htcHtwlBShWk16jQk/aR4sKVLeH6j+N9qmOKm7Gl96PbEi9i72l:b2HtwlaWk1gTsKoH+29q4GGl967kE

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks