General

  • Target

    f40201743250cd62b21ea6a53c9b5cac0cbe8e7eb36b4b899321a63e5ab589ac.doc

  • Size

    740KB

  • Sample

    241024-cyqchszgrf

  • MD5

    f26bb424ef01ec203239aa3a6856faca

  • SHA1

    43368a01d4d0842df97c91a2aa09975f0f90a3e9

  • SHA256

    f40201743250cd62b21ea6a53c9b5cac0cbe8e7eb36b4b899321a63e5ab589ac

  • SHA512

    fba9c8b8003e92a4d4c620f8d636bb11c47e55b5277d6fd796687b4e5aeaf761156c7e65024868399213c65bd2a5e8db5836716b58a6c8a05f6516f3f26262f4

  • SSDEEP

    6144:DwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwA3wyM+3v2jBQK50iMKt6:p

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      f40201743250cd62b21ea6a53c9b5cac0cbe8e7eb36b4b899321a63e5ab589ac.doc

    • Size

      740KB

    • MD5

      f26bb424ef01ec203239aa3a6856faca

    • SHA1

      43368a01d4d0842df97c91a2aa09975f0f90a3e9

    • SHA256

      f40201743250cd62b21ea6a53c9b5cac0cbe8e7eb36b4b899321a63e5ab589ac

    • SHA512

      fba9c8b8003e92a4d4c620f8d636bb11c47e55b5277d6fd796687b4e5aeaf761156c7e65024868399213c65bd2a5e8db5836716b58a6c8a05f6516f3f26262f4

    • SSDEEP

      6144:DwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwA3wyM+3v2jBQK50iMKt6:p

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks