General

  • Target

    989c201580a3fb73ecfeb1e755e5048e9c2330809202b11a7386c87ba6af1e48

  • Size

    1.2MB

  • Sample

    241117-dhbd4azcrq

  • MD5

    0f103ca3251dfd12d4fbae8e53810799

  • SHA1

    083bd1871e2e6ee332d18fc7def60e8770230fca

  • SHA256

    989c201580a3fb73ecfeb1e755e5048e9c2330809202b11a7386c87ba6af1e48

  • SHA512

    e47ddc4823cd125c598291cf303126dbb1c51f27601d298167676d873c71bb94d9de95882676c9f3cf49648a9388926fb4ddfdc6e108cc7c8369b7f5be38cabe

  • SSDEEP

    24576:ffmMv6Ckr7Mny5QL8fFbXuD2QHsl0O2DmNXOy:f3v+7/5QL8fFjuDhsay

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      989c201580a3fb73ecfeb1e755e5048e9c2330809202b11a7386c87ba6af1e48

    • Size

      1.2MB

    • MD5

      0f103ca3251dfd12d4fbae8e53810799

    • SHA1

      083bd1871e2e6ee332d18fc7def60e8770230fca

    • SHA256

      989c201580a3fb73ecfeb1e755e5048e9c2330809202b11a7386c87ba6af1e48

    • SHA512

      e47ddc4823cd125c598291cf303126dbb1c51f27601d298167676d873c71bb94d9de95882676c9f3cf49648a9388926fb4ddfdc6e108cc7c8369b7f5be38cabe

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QL8fFbXuD2QHsl0O2DmNXOy:f3v+7/5QL8fFjuDhsay

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks