General

  • Target

    H3xtNAMuZJNTvr2.exe

  • Size

    789KB

  • Sample

    241104-r99b4atrdm

  • MD5

    04c1bc77fc4a34e3c4971ca8738a1057

  • SHA1

    c59790ad48b3e8579aef6ef7432b4871d60c0f66

  • SHA256

    6a34640515e03a83e2f55398cd4803fdab793a9d901ec4e4748374c9a9cf42ed

  • SHA512

    550b8dbc3ef9bddd9b0bd83b82906510c3aaa4328eb841458006f6553b8ce806eb8fac55ea1a52ea01ceee34c4e57fbfeb8c4d05c641aac2c381003b72dad866

  • SSDEEP

    24576:V5U/fjDNBi9oLReFmBOzYsjYs+a7qIMk:k/NBMFVn/+a/Mk

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      H3xtNAMuZJNTvr2.exe

    • Size

      789KB

    • MD5

      04c1bc77fc4a34e3c4971ca8738a1057

    • SHA1

      c59790ad48b3e8579aef6ef7432b4871d60c0f66

    • SHA256

      6a34640515e03a83e2f55398cd4803fdab793a9d901ec4e4748374c9a9cf42ed

    • SHA512

      550b8dbc3ef9bddd9b0bd83b82906510c3aaa4328eb841458006f6553b8ce806eb8fac55ea1a52ea01ceee34c4e57fbfeb8c4d05c641aac2c381003b72dad866

    • SSDEEP

      24576:V5U/fjDNBi9oLReFmBOzYsjYs+a7qIMk:k/NBMFVn/+a/Mk

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks