General

  • Target

    98a2464ec799d2bbd169e8d65e5cc5fcdee0905685daa4e17d975927dbc86598.doc

  • Size

    656KB

  • Sample

    241030-dnfwrsvfra

  • MD5

    f619515f3a26a0e52bd4a7b9a9696419

  • SHA1

    a364f04cc0412be29a6f4ad105b83fa3568fa1a2

  • SHA256

    98a2464ec799d2bbd169e8d65e5cc5fcdee0905685daa4e17d975927dbc86598

  • SHA512

    89dd15d0cf1eee34dacc82ef990138bd397e0e2ad70ae846d66203781a618abfa5b8b2916b660aab48452b59df0ebc301e9d72277c21be27d4908ad3022cbf28

  • SSDEEP

    6144:5wAYwAYwAYwAYwAYwAYwAYwAC+tfY0m3xw+gQ9lefSS4pAKLXnX2TahBMa:Coh

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      98a2464ec799d2bbd169e8d65e5cc5fcdee0905685daa4e17d975927dbc86598.doc

    • Size

      656KB

    • MD5

      f619515f3a26a0e52bd4a7b9a9696419

    • SHA1

      a364f04cc0412be29a6f4ad105b83fa3568fa1a2

    • SHA256

      98a2464ec799d2bbd169e8d65e5cc5fcdee0905685daa4e17d975927dbc86598

    • SHA512

      89dd15d0cf1eee34dacc82ef990138bd397e0e2ad70ae846d66203781a618abfa5b8b2916b660aab48452b59df0ebc301e9d72277c21be27d4908ad3022cbf28

    • SSDEEP

      6144:5wAYwAYwAYwAYwAYwAYwAYwAC+tfY0m3xw+gQ9lefSS4pAKLXnX2TahBMa:Coh

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks