General

  • Target

    680c2a3691dc7babcf16daad934a2fe8efabb3214bf36f60825b708c7f736015

  • Size

    932KB

  • Sample

    241106-nzyk3asjgn

  • MD5

    acf267b0d4419caff6a79c43e1711b33

  • SHA1

    eb9b5a73815bcf20a23d014d7623004dd06ca10d

  • SHA256

    680c2a3691dc7babcf16daad934a2fe8efabb3214bf36f60825b708c7f736015

  • SHA512

    9fa068f707c21bfaea4ee15a7c47a9992ac43d2fca8294038624964a150e0514eb6eb3133b77146fa531f67188d6e2a78543234ae81ffcfc4035aedc60141c8e

  • SSDEEP

    12288:e1AP1l8h+SBPc5BniqSAP3dt6IO7dLakiEZMSdAs3evICb1ycUpthh:3l8h+SBSiqSAP3dt6IO7Ti3Sdpq1ycQ

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      680c2a3691dc7babcf16daad934a2fe8efabb3214bf36f60825b708c7f736015

    • Size

      932KB

    • MD5

      acf267b0d4419caff6a79c43e1711b33

    • SHA1

      eb9b5a73815bcf20a23d014d7623004dd06ca10d

    • SHA256

      680c2a3691dc7babcf16daad934a2fe8efabb3214bf36f60825b708c7f736015

    • SHA512

      9fa068f707c21bfaea4ee15a7c47a9992ac43d2fca8294038624964a150e0514eb6eb3133b77146fa531f67188d6e2a78543234ae81ffcfc4035aedc60141c8e

    • SSDEEP

      12288:e1AP1l8h+SBPc5BniqSAP3dt6IO7dLakiEZMSdAs3evICb1ycUpthh:3l8h+SBSiqSAP3dt6IO7Ti3Sdpq1ycQ

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks