General

  • Target

    62831f52ad3aaa48bef7b40bf80f4661.bin

  • Size

    725KB

  • Sample

    240913-bl765awcpk

  • MD5

    4cc79fc17f605af0d370e88015dbb753

  • SHA1

    f0a33175bc3b72d5a461f9fdc70d73e8bb64e97f

  • SHA256

    891c444e1a44c1c90448599be1d2ed2e66aedf6a22b9e0d7189e7ba4294cec47

  • SHA512

    6f9ec6a824f47128c908606aa8e1276eefee75330393310d045989d3684f5439ba7decfe9fa0219a7da13ea03f0f8820030de6b395bc7955c14e229f66d11005

  • SSDEEP

    12288:I09qZEpzk8powiQpByGblvY6MSCOZwiHzmPWBkz5OubUM1r8bbY6jF08tfw:DAZvwiQjyCYmvK4DYII

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      b5a624393544e6cb76dab6d34e0699d4f9b4155dce61ee9e3530f564841a0a96.exe

    • Size

      1.1MB

    • MD5

      62831f52ad3aaa48bef7b40bf80f4661

    • SHA1

      1927fec87ab542d634df33893f7c1c37bff36269

    • SHA256

      b5a624393544e6cb76dab6d34e0699d4f9b4155dce61ee9e3530f564841a0a96

    • SHA512

      d73fcf7822a3dd865f5c11edef718fff3023e700444cb8cb8be8196a783a24c69f6ab43cf4a5d31cc16356fa99c179bbd6794982566cd1a0e5ecc0e9bd1b3a79

    • SSDEEP

      24576:mqDEvCTbMWu7rQYlBQcBiT6rprG8aI8A9rCd7A:mTvC/MTQYxsWR7aI/rCd

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks