General

  • Target

    f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe

  • Size

    861KB

  • Sample

    241119-sf2ktsyark

  • MD5

    b036012ff35a5f3738dcd36e5e9d55b1

  • SHA1

    560db191d96f9559c11f8cd8c5bdbe7722c75aa8

  • SHA256

    f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0

  • SHA512

    35f5e6d80cb37ebe4a4de803510ce4d33bb4eddb89e5f4d7e0cdb5811f4b644a1ae1f8ba63ea357f2c6dcc19dbd74428c0834b1982ca40a3a2046e8564600e47

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaCc9OU7VuuYxFMU2SL:7JZoQrbTFZY1iaCcYYKFM2L

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe

    • Size

      861KB

    • MD5

      b036012ff35a5f3738dcd36e5e9d55b1

    • SHA1

      560db191d96f9559c11f8cd8c5bdbe7722c75aa8

    • SHA256

      f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0

    • SHA512

      35f5e6d80cb37ebe4a4de803510ce4d33bb4eddb89e5f4d7e0cdb5811f4b644a1ae1f8ba63ea357f2c6dcc19dbd74428c0834b1982ca40a3a2046e8564600e47

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCc9OU7VuuYxFMU2SL:7JZoQrbTFZY1iaCcYYKFM2L

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks