General

  • Target

    1964409e74e36bbbf384ed0b794965452fd60942e53e5ca3339d763c77c69e18

  • Size

    716KB

  • Sample

    241113-w9l9sazqgp

  • MD5

    7bb9eadea45cf4e4915d09579ef5ac88

  • SHA1

    d296777917219d19645f20b816949fec1f1a524c

  • SHA256

    1964409e74e36bbbf384ed0b794965452fd60942e53e5ca3339d763c77c69e18

  • SHA512

    0fcfb4b1cfcddb88893f1a2de640bb004e5c3f65f905353859fc9bf3f3b06de31e7cdfea11a38fcfe7457bc3d754d7d81754544beff7ad273633ebd5b2adf909

  • SSDEEP

    12288:KZ5tO0qnvyVzJdMGE9RWotVIJcnasORyvdrBab2NebKQDU7bgRyfl9:Y5QLB916JR41BaqNsybgUf

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      1964409e74e36bbbf384ed0b794965452fd60942e53e5ca3339d763c77c69e18

    • Size

      716KB

    • MD5

      7bb9eadea45cf4e4915d09579ef5ac88

    • SHA1

      d296777917219d19645f20b816949fec1f1a524c

    • SHA256

      1964409e74e36bbbf384ed0b794965452fd60942e53e5ca3339d763c77c69e18

    • SHA512

      0fcfb4b1cfcddb88893f1a2de640bb004e5c3f65f905353859fc9bf3f3b06de31e7cdfea11a38fcfe7457bc3d754d7d81754544beff7ad273633ebd5b2adf909

    • SSDEEP

      12288:KZ5tO0qnvyVzJdMGE9RWotVIJcnasORyvdrBab2NebKQDU7bgRyfl9:Y5QLB916JR41BaqNsybgUf

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks