General

  • Target

    xXdquUOrM1vD3An.doc

  • Size

    799KB

  • Sample

    241114-x2g6jasckn

  • MD5

    2087de574fefae441db7ced132da6407

  • SHA1

    6d8b4083d71075be31068808232805ea486f77d8

  • SHA256

    dc8ae41681fdf19abcf62b27b3d8359c32ba6f20bee1e24b7ce9b37d4faebe8b

  • SHA512

    02ead1047af13379ee161c25e1db2c83033daf752629159b9c5836ed0c1d5f6436da73299d920cc10cefe6d4edd3272266d9b4f2088225bc434a53c20ba43ce9

  • SSDEEP

    6144:cwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAaZqGYZHtRD5+XHFTqG9:96e

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      xXdquUOrM1vD3An.doc

    • Size

      799KB

    • MD5

      2087de574fefae441db7ced132da6407

    • SHA1

      6d8b4083d71075be31068808232805ea486f77d8

    • SHA256

      dc8ae41681fdf19abcf62b27b3d8359c32ba6f20bee1e24b7ce9b37d4faebe8b

    • SHA512

      02ead1047af13379ee161c25e1db2c83033daf752629159b9c5836ed0c1d5f6436da73299d920cc10cefe6d4edd3272266d9b4f2088225bc434a53c20ba43ce9

    • SSDEEP

      6144:cwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAaZqGYZHtRD5+XHFTqG9:96e

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks