General

  • Target

    d854f347061d9d7b8a9788ab8633c3f07619e29bd440924507a0147484c217c3

  • Size

    783KB

  • Sample

    241114-jjp7javnhz

  • MD5

    4f80565082ea4d95d933decf9cd50c61

  • SHA1

    2830f9d5f41bbecd2ae105ed0b9a8d49327c8594

  • SHA256

    d854f347061d9d7b8a9788ab8633c3f07619e29bd440924507a0147484c217c3

  • SHA512

    9dcdae5c7a5b4181ade738884e208508bf317742ca2be0726716aa71236670a50dae2bec947b3fcc12cfc85c756810f18a9f403de4eb428b4a73a4759037f227

  • SSDEEP

    24576:cmCJVCABws3ok2B3KE0cZICs/dZvo7sK:cJ0ABsB1P0wICsVIs

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      d854f347061d9d7b8a9788ab8633c3f07619e29bd440924507a0147484c217c3

    • Size

      783KB

    • MD5

      4f80565082ea4d95d933decf9cd50c61

    • SHA1

      2830f9d5f41bbecd2ae105ed0b9a8d49327c8594

    • SHA256

      d854f347061d9d7b8a9788ab8633c3f07619e29bd440924507a0147484c217c3

    • SHA512

      9dcdae5c7a5b4181ade738884e208508bf317742ca2be0726716aa71236670a50dae2bec947b3fcc12cfc85c756810f18a9f403de4eb428b4a73a4759037f227

    • SSDEEP

      24576:cmCJVCABws3ok2B3KE0cZICs/dZvo7sK:cJ0ABsB1P0wICsVIs

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks