General

  • Target

    PO5986.7z

  • Size

    896KB

  • Sample

    241030-sj5fwswcmf

  • MD5

    681602ba3466a1c75a4d14f6d2d05097

  • SHA1

    4766ec1fb49d38e64f4862fe6cf8ea037dab760a

  • SHA256

    67b4389759da97197c8fc19df497e8892bc60e4c45733e36feeedfe49bc9dd09

  • SHA512

    c5a2d5f46a26ab98d745940a736d72a941ea9ebd8af748603280b994ab541386c3bd04cd0e83784ab8a8f67e1fa838e50004437694d20b4db80bff3d2b9ff776

  • SSDEEP

    24576:Gy5K1eRUsEc2gCjqnrVTh548cIJvLwhs8924bhJUXF2XYrD:S1e2c2g4qnhLzLC2ES4SD

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      PO 5986.exe

    • Size

      1.4MB

    • MD5

      8aa0f8af4e622539b7ef1ca4ecd5c854

    • SHA1

      717c962a351e1eb42152e7bed863c3b9282c5773

    • SHA256

      e0092c676baa6a82e979fa3cc3e71d73abb09bfbd98b2948ac427006bfd0de9e

    • SHA512

      009166a6b0ef762b4e05fa5e8a35300b01f4bae1b1056d922ee0cd781e428485639dd7fd2a7d9cb43ee163e9faa53c4da319b600935d72bc6be29449890b65d5

    • SSDEEP

      24576:4qDEvCTbMWu7rQYlBQcBiT6rprG8arVXlzAhw4ryI9vLwlzU92XxhDUKe2Xl:4TvC/MTQYxsWR7arVXpotLJ2BTh

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks