General

  • Target

    30a59bea045a1d5279f62a8ade0daa242dafc5440540f29032f91f33c074caa5N

  • Size

    1.1MB

  • Sample

    241109-j4nt7s1dlc

  • MD5

    6892e3ff6b1ce916d72d4b8af65f88e0

  • SHA1

    c0713edcf24a2a19491991467e61161b11aa296e

  • SHA256

    30a59bea045a1d5279f62a8ade0daa242dafc5440540f29032f91f33c074caa5

  • SHA512

    c525134479e7762018e6aee112fd0970d5d15c143037a354c34bc94a1e73c4a7e79e1cf71a9867d40d0c506942dea71e5fb55ed715441d7155344adef4d7f896

  • SSDEEP

    24576:jiUmSB/o5d1ubcvTea/PYr9+0z8LyHJUWjn4SWyINEr9tOXvnrCZ/8evS:j/mU/ohubcvTea/PYr9+0YuHOW7VINaD

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      30a59bea045a1d5279f62a8ade0daa242dafc5440540f29032f91f33c074caa5N

    • Size

      1.1MB

    • MD5

      6892e3ff6b1ce916d72d4b8af65f88e0

    • SHA1

      c0713edcf24a2a19491991467e61161b11aa296e

    • SHA256

      30a59bea045a1d5279f62a8ade0daa242dafc5440540f29032f91f33c074caa5

    • SHA512

      c525134479e7762018e6aee112fd0970d5d15c143037a354c34bc94a1e73c4a7e79e1cf71a9867d40d0c506942dea71e5fb55ed715441d7155344adef4d7f896

    • SSDEEP

      24576:jiUmSB/o5d1ubcvTea/PYr9+0z8LyHJUWjn4SWyINEr9tOXvnrCZ/8evS:j/mU/ohubcvTea/PYr9+0YuHOW7VINaD

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks