General

  • Target

    8feed4062b93ff232c8d624baf73699d1e25e2a745717d73ec648d498c44bc45.exe

  • Size

    776KB

  • Sample

    241106-sj1spsshqq

  • MD5

    5079523d601ca936c4850f6bd51f4129

  • SHA1

    52d4fac94c6c0feb43276400a6281a51e65a4d53

  • SHA256

    8feed4062b93ff232c8d624baf73699d1e25e2a745717d73ec648d498c44bc45

  • SHA512

    9b6d057daaf5974b6ad63bdc16d9cd0b7137952890e849385e8c5ca995aef4a1f0f85f248ad5a1255a402a269eeec4397550993ace042beb36c9fecf930972bd

  • SSDEEP

    12288:W2f00lxD8T3R2vW9ZBwISky2HGEoNx8Dci54AlpwcW:+T3RQWnBtSkRHkxhi5Z/c

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.tksteels.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    24eatkpr$

Targets

    • Target

      8feed4062b93ff232c8d624baf73699d1e25e2a745717d73ec648d498c44bc45.exe

    • Size

      776KB

    • MD5

      5079523d601ca936c4850f6bd51f4129

    • SHA1

      52d4fac94c6c0feb43276400a6281a51e65a4d53

    • SHA256

      8feed4062b93ff232c8d624baf73699d1e25e2a745717d73ec648d498c44bc45

    • SHA512

      9b6d057daaf5974b6ad63bdc16d9cd0b7137952890e849385e8c5ca995aef4a1f0f85f248ad5a1255a402a269eeec4397550993ace042beb36c9fecf930972bd

    • SSDEEP

      12288:W2f00lxD8T3R2vW9ZBwISky2HGEoNx8Dci54AlpwcW:+T3RQWnBtSkRHkxhi5Z/c

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks