General

  • Target

    06795a5a7eb5d44e427c0adeeac9867dd8f2e0a73b2bbbbba47b36c10df70bce.img

  • Size

    1.9MB

  • Sample

    241102-cpgc9aybpr

  • MD5

    587c4dd31c686b4173a90ae08e0f7c84

  • SHA1

    d99b6905d2eef5d317a96e9281e4726e3fbcbd75

  • SHA256

    06795a5a7eb5d44e427c0adeeac9867dd8f2e0a73b2bbbbba47b36c10df70bce

  • SHA512

    8f6e8d54953711e5e5ef56d2778a72c5c80f5cc1a9191403e710fcee9038e5254969fbe27ac63eaf8ad2a8bb551d1da80f7719148ec9662e1f2ab63b43e1d2b5

  • SSDEEP

    24576:kqDEvCTbMWu7rQYlBQcBiT6rprG8aTdo8vtaByatj8iZCMkb0k//Mz:kTvC/MTQYxsWR7aTNveHtRZCM+M

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      Maksājums10312024,jpg.exe

    • Size

      1.4MB

    • MD5

      d155bbf3b7aeebfcd96f0ad99ab8d634

    • SHA1

      22150906ad0e14b9385ae7fd079f37d960be4213

    • SHA256

      140f74d6834ec93d4279dd1f3c9efe3a0a68c8ee78a63cb9556d990fd6753fe5

    • SHA512

      eb3b5ff3b002329bb6ea0e1c1ed30d0273b361984dfc8942f1d5cc34f4462d9499cfbfb8742f6f31d93f3416c6936c00aa379cc3f5b0a6f78380746f1f12dc6c

    • SSDEEP

      24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8aTdo8vtaByatj8iZCMkb0k//Mz:sTvC/MTQYxsWR7aTNveHtRZCM+M

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks