General

  • Target

    e3089a51cb8e5ea6a8b180929d7035df.bin

  • Size

    619KB

  • Sample

    241117-b7glasyclb

  • MD5

    3cf71ab17de20c7623681e22d0fef033

  • SHA1

    2a62ee58b02a05c4c72fb10cfbb7e2244258673e

  • SHA256

    c381b6f26f45ce883db9092253c178dd6be9690aa9afa6d3f9fc6aed140827db

  • SHA512

    ecb283913faa8f7944da1dab6bdaa03bca726833ba41d966a0315f0e7304718804d72dee89a54342477f83c9a31b2671e279fbbf3e1e78e59d430e5e3b04213d

  • SSDEEP

    12288:U2TO3jBRSMN03mY2QHnFEtSM9Os5V/4Pxhv6q3:8jBDN03mY2/kD6G

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      682f2d80ff4ce0051e4f69035c89f9b30e7fc019aead7dd4c2f02b4fa2583851.exe

    • Size

      3.2MB

    • MD5

      e3089a51cb8e5ea6a8b180929d7035df

    • SHA1

      48af8061347ba332ef963fd776b4740bc0b5e89c

    • SHA256

      682f2d80ff4ce0051e4f69035c89f9b30e7fc019aead7dd4c2f02b4fa2583851

    • SHA512

      186f6f8272a4899d14fce91f48f574c7fa57fd8ccddbdb438128b390931bc120c9bcf1b66ddda6c60b6a618a676837477ba132e9cda1508f7665e32c54e257d9

    • SSDEEP

      24576:JIpiKqbfBJCX29z/MUXtDUcBNNXdA1Dql+mcnwHN4zd:SpiKqbfBJYa5tDUo7XSol+mcnwtad

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks