General

  • Target

    2392583c488d5bb95ea7bd8f2f920fe27b2b27f6c1993606aca7be7cfe084d42.exe

  • Size

    756KB

  • Sample

    241119-bf16maxhpe

  • MD5

    11f939718d225d8b5acd79c434d3d9e0

  • SHA1

    73ca32ce2bdd4b78bd096042407526ec19a22e8c

  • SHA256

    2392583c488d5bb95ea7bd8f2f920fe27b2b27f6c1993606aca7be7cfe084d42

  • SHA512

    b7941d5e1c98ef1d98f989cc6c6177de9efd823cae13fa9c0d3b40b05f52118194f0f2a9c151e419e86ec181e9381c0f104c4a92de57849057e9ad343055b4f9

  • SSDEEP

    12288:l2+nSPz5JA/EME8jGql7WV1OaTpFJKoewYlfM9D9HFu4Q:noz5m/EJz+FaTEo7Yl4DPu4Q

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      2392583c488d5bb95ea7bd8f2f920fe27b2b27f6c1993606aca7be7cfe084d42.exe

    • Size

      756KB

    • MD5

      11f939718d225d8b5acd79c434d3d9e0

    • SHA1

      73ca32ce2bdd4b78bd096042407526ec19a22e8c

    • SHA256

      2392583c488d5bb95ea7bd8f2f920fe27b2b27f6c1993606aca7be7cfe084d42

    • SHA512

      b7941d5e1c98ef1d98f989cc6c6177de9efd823cae13fa9c0d3b40b05f52118194f0f2a9c151e419e86ec181e9381c0f104c4a92de57849057e9ad343055b4f9

    • SSDEEP

      12288:l2+nSPz5JA/EME8jGql7WV1OaTpFJKoewYlfM9D9HFu4Q:noz5m/EJz+FaTEo7Yl4DPu4Q

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks