General

  • Target

    2c1e44e7ddf88303822b2a9e7cbfaeedbdbe3ace36ce3e028d19b68cf33c11b3

  • Size

    458KB

  • Sample

    241023-12cgtsterm

  • MD5

    918f63aeccaa7aeef06d25c031acd858

  • SHA1

    7234c8c1a704ee3cb3f9f30f560a02fd0f5ec87c

  • SHA256

    2c1e44e7ddf88303822b2a9e7cbfaeedbdbe3ace36ce3e028d19b68cf33c11b3

  • SHA512

    aa1bbd9609e92b1e5319c28586ef2a3ce105335f457069ea6c3c05ccde8b1d6b008cdac6f6236fde74a64f3e07695a5eb2ce5041101fbdf95c55c1f885fa7f87

  • SSDEEP

    6144:zzbUb0cVLNEzYvRSPlaMXKaAi69qltTGSmNZ5m9tmYL6qoPQ7tmYB/l2mDlJjAIJ:NkF5SPMM6I9X4Xs9mrm9Bt2mhW8G0Y8

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      2c1e44e7ddf88303822b2a9e7cbfaeedbdbe3ace36ce3e028d19b68cf33c11b3

    • Size

      458KB

    • MD5

      918f63aeccaa7aeef06d25c031acd858

    • SHA1

      7234c8c1a704ee3cb3f9f30f560a02fd0f5ec87c

    • SHA256

      2c1e44e7ddf88303822b2a9e7cbfaeedbdbe3ace36ce3e028d19b68cf33c11b3

    • SHA512

      aa1bbd9609e92b1e5319c28586ef2a3ce105335f457069ea6c3c05ccde8b1d6b008cdac6f6236fde74a64f3e07695a5eb2ce5041101fbdf95c55c1f885fa7f87

    • SSDEEP

      6144:zzbUb0cVLNEzYvRSPlaMXKaAi69qltTGSmNZ5m9tmYL6qoPQ7tmYB/l2mDlJjAIJ:NkF5SPMM6I9X4Xs9mrm9Bt2mhW8G0Y8

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks