General

  • Target

    eceb26bdb02cc022a27d7ad41deac697590037e693c10988e14a5183612ce0cfN

  • Size

    1.1MB

  • Sample

    241026-te14catlcp

  • MD5

    fcd32036f064d41fbcccdd0b489a5470

  • SHA1

    e938d5538ddb1ce0a82c15cf5038fd0d234c417d

  • SHA256

    eceb26bdb02cc022a27d7ad41deac697590037e693c10988e14a5183612ce0cf

  • SHA512

    f6e0bfd02fdd9dddaa62ead136189cf176474eb1eaa4c7e5ba2f0279d458d3d66dc24e630cf4f545ca9d872286db91ef5f696bbb2d0441f849a4b297d5dea16d

  • SSDEEP

    24576:lfmMv6Ckr7Mny5QM7hmQbt2OuinTfnZVJS3DGwcgEtj1:l3v+7/5QMvbnnTB0xG1

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      eceb26bdb02cc022a27d7ad41deac697590037e693c10988e14a5183612ce0cfN

    • Size

      1.1MB

    • MD5

      fcd32036f064d41fbcccdd0b489a5470

    • SHA1

      e938d5538ddb1ce0a82c15cf5038fd0d234c417d

    • SHA256

      eceb26bdb02cc022a27d7ad41deac697590037e693c10988e14a5183612ce0cf

    • SHA512

      f6e0bfd02fdd9dddaa62ead136189cf176474eb1eaa4c7e5ba2f0279d458d3d66dc24e630cf4f545ca9d872286db91ef5f696bbb2d0441f849a4b297d5dea16d

    • SSDEEP

      24576:lfmMv6Ckr7Mny5QM7hmQbt2OuinTfnZVJS3DGwcgEtj1:l3v+7/5QMvbnnTB0xG1

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks