General

  • Target

    c169a73ca29094fb2cb53c32f7cddf5fb633494a8e498ef9abb0057a19293155

  • Size

    679KB

  • Sample

    241119-l6tvcatfnh

  • MD5

    1edf5823d724ea8da51a635e8cba968c

  • SHA1

    368fd1f557e1ebec00d0ae97b6c86be091f95e19

  • SHA256

    c169a73ca29094fb2cb53c32f7cddf5fb633494a8e498ef9abb0057a19293155

  • SHA512

    393b896efe7ab9debfcc9c774a766db1a304d58fc6fe74a09a7d36c495a4aeaefc4072244886f88a65737141bfc7def98ae4e2f0eff89d1ed48e41aac8b3b91f

  • SSDEEP

    12288:YGPg/s0yuAt682LufMeJidMx6U0/OQEGzhy6KL2FJKU/InxCQYHoXTZ:CrA8mfMeJidMAUEOQEGlKonYxJYHC

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      c169a73ca29094fb2cb53c32f7cddf5fb633494a8e498ef9abb0057a19293155

    • Size

      679KB

    • MD5

      1edf5823d724ea8da51a635e8cba968c

    • SHA1

      368fd1f557e1ebec00d0ae97b6c86be091f95e19

    • SHA256

      c169a73ca29094fb2cb53c32f7cddf5fb633494a8e498ef9abb0057a19293155

    • SHA512

      393b896efe7ab9debfcc9c774a766db1a304d58fc6fe74a09a7d36c495a4aeaefc4072244886f88a65737141bfc7def98ae4e2f0eff89d1ed48e41aac8b3b91f

    • SSDEEP

      12288:YGPg/s0yuAt682LufMeJidMx6U0/OQEGzhy6KL2FJKU/InxCQYHoXTZ:CrA8mfMeJidMAUEOQEGlKonYxJYHC

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks