General
-
Target
29102024_1600_29102024_TBHD_779320023221.gz
-
Size
805KB
-
Sample
241029-tftewsxpep
-
MD5
b595e96e018b9dabff370845b99e12af
-
SHA1
73d24a68a278601192642453feac9f88d62c18ea
-
SHA256
39f0f3fd75ec245585fdf6bbd8207943fc810b43656298bc95b984bea6c66e55
-
SHA512
48934b3855916b73f7478249213df4ae2418fe7a541e743453a9d3e5e8e29890d7e5dc7a6b505e78d4b47b47f765c37e255c98ab78992e45b37951c24e0e2ae7
-
SSDEEP
12288:JXmhHFFaOsHEFJc6amUMGb5QoBlMGkVI5Eow8R/uiedOOe9Ib:m+J7MGNQoB/kSbwQ1gZb
Static task
static1
Behavioral task
behavioral1
Sample
TBHD_779320023221.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
TBHD_779320023221.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.vinatax.us - Port:
587 - Username:
[email protected] - Password:
vinatax@2022 - Email To:
[email protected]
Targets
-
-
Target
TBHD_779320023221.exe
-
Size
981KB
-
MD5
462a9165371be9c5f86b76adbc068d37
-
SHA1
ff92bce9d712585aea9d85be80c3142a23353613
-
SHA256
20b22e21664030bcbea413d2c054f99f62956cf9feedc6148fe34870ce124f79
-
SHA512
c4008ca783ff00c5416167731944c5b5dcdeb7eefd114b6c2ad450b60e49a01cda62eab377c5e7cf084382c5b7738c7756a3a4875c7de732ff2d8a91bc62a601
-
SSDEEP
12288:NiweayfGZVFFaAmpa/JQYemIy0R5C83ju8IhEZEusORzu+2p4EeP1R6FUkR:YweaMGj+Vzy0PC837IYHsU1Ma6FT
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2