General

  • Target

    7dce1195115612ac6263cf59dbc32c2f43dd253302e1b50eb3d4ff5a81a739ba.uue

  • Size

    744KB

  • Sample

    241026-chj6kaygrl

  • MD5

    96991e9c7ff8192ec7246506df3950a8

  • SHA1

    4d5aecf6fece78360f06a4304b4fe146f1e26a1c

  • SHA256

    7dce1195115612ac6263cf59dbc32c2f43dd253302e1b50eb3d4ff5a81a739ba

  • SHA512

    fd9288cf17e939b4a06ed9fcfd4cf41028aa94ed3a2821c5dc1281cd4027251678f33ed82560345484bd5f32c8f63a45144293d13def8cddb84bd47e411e1481

  • SSDEEP

    12288:b+N2cR0kzaNOCSGBzax7ESGaRu0OQY6jZsG6IV8rvw3L3fHF+l7lXuZpewcwd+cN:VcKyIaxgSGaRu05tKlMLvFa7lupqwd+i

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe

    • Size

      821KB

    • MD5

      d8daeb11e006370f3b454df74c382ced

    • SHA1

      3351af8f5627d4df174d4c659391a40d9563ca37

    • SHA256

      7b57e6494bb05f09e8a09a69b3c9f28239fe18cb469d223826c95bee2d650197

    • SHA512

      d57fe6e72acbbb577c9b4dd36a53367a4d0cadfde7e32c036caa7adffd01ae021baa8e2beff7bbf06fb3927c0b74f84725f0714d05b7ed1e81e1f5a5b258fb86

    • SSDEEP

      12288:zbedZeA56A4KUwU2dEa4oDr2rxR5NiYrDkhNSOG6BgKBizbNEW0JTWxH+odSheub:75wUWEa4iU8wDINnenL/5twheu35wq

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks