General

  • Target

    fbdd9415cb81b05718eb989fc29ac96e76e6349515f2eec3b30899e041d06f0b.exe

  • Size

    777KB

  • Sample

    241113-xsnxqa1laj

  • MD5

    f899d0e408905550dbc0d11a29a7f014

  • SHA1

    547d454a658393bb5fc3479333cde132acbeadd8

  • SHA256

    fbdd9415cb81b05718eb989fc29ac96e76e6349515f2eec3b30899e041d06f0b

  • SHA512

    12bf4021bcfc9c8c7c41df9f92d14440d0776ea69a4fcf14dac08b0090545404f7c2a08e26b6a4369835abb270b4cda11935a067f88f5e0f61e6500cc9fb5988

  • SSDEEP

    12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCZxHrPKIawhJk:uRmJkcoQricOIQxiZY1iaCZxHriIawfk

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      fbdd9415cb81b05718eb989fc29ac96e76e6349515f2eec3b30899e041d06f0b.exe

    • Size

      777KB

    • MD5

      f899d0e408905550dbc0d11a29a7f014

    • SHA1

      547d454a658393bb5fc3479333cde132acbeadd8

    • SHA256

      fbdd9415cb81b05718eb989fc29ac96e76e6349515f2eec3b30899e041d06f0b

    • SHA512

      12bf4021bcfc9c8c7c41df9f92d14440d0776ea69a4fcf14dac08b0090545404f7c2a08e26b6a4369835abb270b4cda11935a067f88f5e0f61e6500cc9fb5988

    • SSDEEP

      12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCZxHrPKIawhJk:uRmJkcoQricOIQxiZY1iaCZxHriIawfk

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks