General
-
Target
92caa6edcc0ec84e589343420fb5acb0a96b5494567aa8f6ccc55c3008424d1f.exe
-
Size
1.0MB
-
Sample
241113-web6bszlcr
-
MD5
d380c2d02dc25c3ae4c36a2a9bf2649e
-
SHA1
4ebd2c449a6096be94f5e3d810832e472d9842e5
-
SHA256
92caa6edcc0ec84e589343420fb5acb0a96b5494567aa8f6ccc55c3008424d1f
-
SHA512
ec8e41661684b99adee5f734f7ff438293b38c98610b687127b2f163aff301be5e7c8a69c9e70575876d6fdfd1c3676391d560306d3d479181108267a2b8375f
-
SSDEEP
24576:Ar7nRmn86KOYj5bRQ4lthLGe6wSOc6aEDWJM5f6:ARm3KJbHhR86aEyJq6
Static task
static1
Behavioral task
behavioral1
Sample
92caa6edcc0ec84e589343420fb5acb0a96b5494567aa8f6ccc55c3008424d1f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
92caa6edcc0ec84e589343420fb5acb0a96b5494567aa8f6ccc55c3008424d1f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Targets
-
-
Target
92caa6edcc0ec84e589343420fb5acb0a96b5494567aa8f6ccc55c3008424d1f.exe
-
Size
1.0MB
-
MD5
d380c2d02dc25c3ae4c36a2a9bf2649e
-
SHA1
4ebd2c449a6096be94f5e3d810832e472d9842e5
-
SHA256
92caa6edcc0ec84e589343420fb5acb0a96b5494567aa8f6ccc55c3008424d1f
-
SHA512
ec8e41661684b99adee5f734f7ff438293b38c98610b687127b2f163aff301be5e7c8a69c9e70575876d6fdfd1c3676391d560306d3d479181108267a2b8375f
-
SSDEEP
24576:Ar7nRmn86KOYj5bRQ4lthLGe6wSOc6aEDWJM5f6:ARm3KJbHhR86aEyJq6
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2