General

  • Target

    New Order_Purchase_202401017.exe

  • Size

    789KB

  • Sample

    241017-qmz98ssepm

  • MD5

    48ba025a37787edc3a221155a135018f

  • SHA1

    91ff3bb3bfe316d4c7811ca899bc47323210c266

  • SHA256

    d41fe3fc605a799e6f95c52cc16d35a2f1bc03fd166187a1c6fd830f287e3518

  • SHA512

    99c0be7ef941a2cc1a20e217d295b7915dfe435f6a97644d23810e3056922c08936641398bcea45401ceb5559441df8c5b1ef45417f5b466a425caf6bcedf7a2

  • SSDEEP

    24576:WJcu+7e6zsGEDFZeKtjfib4t/uPkSgNopI61RWBY:WX+gGQeKtji8BusfopIcWK

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      New Order_Purchase_202401017.exe

    • Size

      789KB

    • MD5

      48ba025a37787edc3a221155a135018f

    • SHA1

      91ff3bb3bfe316d4c7811ca899bc47323210c266

    • SHA256

      d41fe3fc605a799e6f95c52cc16d35a2f1bc03fd166187a1c6fd830f287e3518

    • SHA512

      99c0be7ef941a2cc1a20e217d295b7915dfe435f6a97644d23810e3056922c08936641398bcea45401ceb5559441df8c5b1ef45417f5b466a425caf6bcedf7a2

    • SSDEEP

      24576:WJcu+7e6zsGEDFZeKtjfib4t/uPkSgNopI61RWBY:WX+gGQeKtji8BusfopIcWK

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks