General

  • Target

    Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe

  • Size

    821KB

  • Sample

    241025-h3slbsxemk

  • MD5

    d8daeb11e006370f3b454df74c382ced

  • SHA1

    3351af8f5627d4df174d4c659391a40d9563ca37

  • SHA256

    7b57e6494bb05f09e8a09a69b3c9f28239fe18cb469d223826c95bee2d650197

  • SHA512

    d57fe6e72acbbb577c9b4dd36a53367a4d0cadfde7e32c036caa7adffd01ae021baa8e2beff7bbf06fb3927c0b74f84725f0714d05b7ed1e81e1f5a5b258fb86

  • SSDEEP

    12288:zbedZeA56A4KUwU2dEa4oDr2rxR5NiYrDkhNSOG6BgKBizbNEW0JTWxH+odSheub:75wUWEa4iU8wDINnenL/5twheu35wq

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe

    • Size

      821KB

    • MD5

      d8daeb11e006370f3b454df74c382ced

    • SHA1

      3351af8f5627d4df174d4c659391a40d9563ca37

    • SHA256

      7b57e6494bb05f09e8a09a69b3c9f28239fe18cb469d223826c95bee2d650197

    • SHA512

      d57fe6e72acbbb577c9b4dd36a53367a4d0cadfde7e32c036caa7adffd01ae021baa8e2beff7bbf06fb3927c0b74f84725f0714d05b7ed1e81e1f5a5b258fb86

    • SSDEEP

      12288:zbedZeA56A4KUwU2dEa4oDr2rxR5NiYrDkhNSOG6BgKBizbNEW0JTWxH+odSheub:75wUWEa4iU8wDINnenL/5twheu35wq

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks