General

  • Target

    2cabc41b8e44e0101ceca0923c6abbd2459aabeff1831d700f2cfd1e3487dc20

  • Size

    725KB

  • Sample

    241115-ww94pazalm

  • MD5

    7f4ca79b19e121a41b7f608ba7e2b10c

  • SHA1

    65e61000df8fc081736e24ced57b330f7dec81ad

  • SHA256

    2cabc41b8e44e0101ceca0923c6abbd2459aabeff1831d700f2cfd1e3487dc20

  • SHA512

    0a18703848fdea06ae5e8dd8d612f7d89b7419148042f757f5a06587eedc8c1021d183a9993af132579f74e95f42d3c3ea2d14cb558f3bb339095f191f783879

  • SSDEEP

    12288:hGaDPw1Qk89TmyXwPzbR6ZejcbkGseAeiQ/2lWJcucw1EwglSNaN31wtay0iV3+4:h7Lw9gTFgRLj41SWaIcjUaNlwQy0Y+0f

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      2cabc41b8e44e0101ceca0923c6abbd2459aabeff1831d700f2cfd1e3487dc20

    • Size

      725KB

    • MD5

      7f4ca79b19e121a41b7f608ba7e2b10c

    • SHA1

      65e61000df8fc081736e24ced57b330f7dec81ad

    • SHA256

      2cabc41b8e44e0101ceca0923c6abbd2459aabeff1831d700f2cfd1e3487dc20

    • SHA512

      0a18703848fdea06ae5e8dd8d612f7d89b7419148042f757f5a06587eedc8c1021d183a9993af132579f74e95f42d3c3ea2d14cb558f3bb339095f191f783879

    • SSDEEP

      12288:hGaDPw1Qk89TmyXwPzbR6ZejcbkGseAeiQ/2lWJcucw1EwglSNaN31wtay0iV3+4:h7Lw9gTFgRLj41SWaIcjUaNlwQy0Y+0f

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks