General

  • Target

    お見積依頼、_20241113.zip

  • Size

    644KB

  • Sample

    241113-d6k87swcrp

  • MD5

    de7ceb98941e9d9ceccfdd2b545af8f8

  • SHA1

    aab112c670d46de2ababb1e631336564d97744e2

  • SHA256

    a0cff2406a1b0101909f589dcdd5c6cce94e211373d0cea45209bbff1afea50b

  • SHA512

    70878c66d39e6119aeb878d9ece7d89f112190dca29f30fd3888f2c1c415a4182ce5ebe4de25124b64550dff4befaadfad71f528ae5a52eef38cb10730a5fe07

  • SSDEEP

    12288:aR9ay9NOYlJdam9R3FqcovO/V0kVQ7kG3x7T+JmjUtw1m+IY2R:a6EtJd9X8KV0IQ753x/+ofItLR

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      お見積依頼、_20241113.exe

    • Size

      701KB

    • MD5

      77cf9c286b05a5afaca2de336ba1f075

    • SHA1

      bc95b5df0602b53675429f06a9f1e367b65e1b86

    • SHA256

      39adb205bc13aa9d2e6e2531da9c7955e46f5e27fceae045a8c040971e702ec0

    • SHA512

      e42e9dd3c26926354cabaed656042db7d3294f90a942ce5c33ea16d11f0b2e078489c5e9d9ab33a25266eec1f0b5df3bf80764dcbd17ebe91775b5622fb846db

    • SSDEEP

      12288:JMyCotxqmA3F+mGDTLXRNFovOLV0kzO7ka3x7TCJmxa564nv+Z1chLX/3R:JMyBqmubWTLho0V0EO7D3x/CIp82Z1c/

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks