General

  • Target

    a4b35cf0c6b13161e66207d61603c2f19c691c557e2a7f189b8f67460a757e40.exe

  • Size

    269KB

  • Sample

    241105-nkeveazfmg

  • MD5

    be76fcc236b9cf3ba5dcc13233b902ca

  • SHA1

    af085216482dd8530fef54aa859e52aa48ad2ec7

  • SHA256

    a4b35cf0c6b13161e66207d61603c2f19c691c557e2a7f189b8f67460a757e40

  • SHA512

    c35dbc7d5acfa39dd92cbe705d5ef262a0421e25502613146910fe364b1d70103ef09baa399fe5ef1a312f6e2be4d741a3e5b438684f6894620100541bac6503

  • SSDEEP

    3072:9pdjv4WNr0HTfNUWwB0XpNTjZgAOQ5pH1/Up6ebfcsoqXYTVgHilbbY:g3XibPYb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      a4b35cf0c6b13161e66207d61603c2f19c691c557e2a7f189b8f67460a757e40.exe

    • Size

      269KB

    • MD5

      be76fcc236b9cf3ba5dcc13233b902ca

    • SHA1

      af085216482dd8530fef54aa859e52aa48ad2ec7

    • SHA256

      a4b35cf0c6b13161e66207d61603c2f19c691c557e2a7f189b8f67460a757e40

    • SHA512

      c35dbc7d5acfa39dd92cbe705d5ef262a0421e25502613146910fe364b1d70103ef09baa399fe5ef1a312f6e2be4d741a3e5b438684f6894620100541bac6503

    • SSDEEP

      3072:9pdjv4WNr0HTfNUWwB0XpNTjZgAOQ5pH1/Up6ebfcsoqXYTVgHilbbY:g3XibPYb

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks