General

  • Target

    29102024_1600_29102024_TBHD_779320023221.gz

  • Size

    805KB

  • Sample

    241029-tftewsxpep

  • MD5

    b595e96e018b9dabff370845b99e12af

  • SHA1

    73d24a68a278601192642453feac9f88d62c18ea

  • SHA256

    39f0f3fd75ec245585fdf6bbd8207943fc810b43656298bc95b984bea6c66e55

  • SHA512

    48934b3855916b73f7478249213df4ae2418fe7a541e743453a9d3e5e8e29890d7e5dc7a6b505e78d4b47b47f765c37e255c98ab78992e45b37951c24e0e2ae7

  • SSDEEP

    12288:JXmhHFFaOsHEFJc6amUMGb5QoBlMGkVI5Eow8R/uiedOOe9Ib:m+J7MGNQoB/kSbwQ1gZb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      TBHD_779320023221.exe

    • Size

      981KB

    • MD5

      462a9165371be9c5f86b76adbc068d37

    • SHA1

      ff92bce9d712585aea9d85be80c3142a23353613

    • SHA256

      20b22e21664030bcbea413d2c054f99f62956cf9feedc6148fe34870ce124f79

    • SHA512

      c4008ca783ff00c5416167731944c5b5dcdeb7eefd114b6c2ad450b60e49a01cda62eab377c5e7cf084382c5b7738c7756a3a4875c7de732ff2d8a91bc62a601

    • SSDEEP

      12288:NiweayfGZVFFaAmpa/JQYemIy0R5C83ju8IhEZEusORzu+2p4EeP1R6FUkR:YweaMGj+Vzy0PC837IYHsU1Ma6FT

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks