General

  • Target

    2e9b7e6e253e2480019ac44b8f712d81260dcbbf3f312cd4e2d224f6a7c761bb.exe

  • Size

    784KB

  • Sample

    241115-s1hnfswhmr

  • MD5

    764eeb48d6016c0caf91498ed5b4b9fa

  • SHA1

    11aaa8c4ed72f05919553def409c4e36419d35bd

  • SHA256

    2e9b7e6e253e2480019ac44b8f712d81260dcbbf3f312cd4e2d224f6a7c761bb

  • SHA512

    ce8fda6bd7920587656687bc3b7dc68ea0a851aee45e224102c0bc475e3237797f162608ee437673d76d04de15eae4e47b082021e953ba8d97936ecf2cdc7617

  • SSDEEP

    24576:A5CJVwLNNNizk+m0v5C8IomqxL8q0A9O6yN:AY6vNmm0v5Tv/8m9yN

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      2e9b7e6e253e2480019ac44b8f712d81260dcbbf3f312cd4e2d224f6a7c761bb.exe

    • Size

      784KB

    • MD5

      764eeb48d6016c0caf91498ed5b4b9fa

    • SHA1

      11aaa8c4ed72f05919553def409c4e36419d35bd

    • SHA256

      2e9b7e6e253e2480019ac44b8f712d81260dcbbf3f312cd4e2d224f6a7c761bb

    • SHA512

      ce8fda6bd7920587656687bc3b7dc68ea0a851aee45e224102c0bc475e3237797f162608ee437673d76d04de15eae4e47b082021e953ba8d97936ecf2cdc7617

    • SSDEEP

      24576:A5CJVwLNNNizk+m0v5C8IomqxL8q0A9O6yN:AY6vNmm0v5Tv/8m9yN

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks