General

  • Target

    Xkl0PnD8zFPjfh1.wiz.rtf

  • Size

    408KB

  • Sample

    241119-vpztpszaml

  • MD5

    f6e89e6c3ab17d8d58699ccefeaf3c8d

  • SHA1

    86c245d0a2ef138aa7afca6bb43316e251b07c68

  • SHA256

    32f5bf26d32b42212ada3e88017ad037c6c84f760a64585252576d893a00ff5f

  • SHA512

    ab3a82dcd600c7169da373101593480a1ef8e82b2d339b5367f0e2b118f23ec3eb591a3e269de3f5d8b0e0843ec4574b33c5f98e0344c4be38a26c25caccb4b6

  • SSDEEP

    3072:wwAlawAlawAlawAlawAlawAlawAlawAltU8xX2iqwq3QS:wwAYwAYwAYwAYwAYwAYwAYwA3dTqAS

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Xkl0PnD8zFPjfh1.wiz.rtf

    • Size

      408KB

    • MD5

      f6e89e6c3ab17d8d58699ccefeaf3c8d

    • SHA1

      86c245d0a2ef138aa7afca6bb43316e251b07c68

    • SHA256

      32f5bf26d32b42212ada3e88017ad037c6c84f760a64585252576d893a00ff5f

    • SHA512

      ab3a82dcd600c7169da373101593480a1ef8e82b2d339b5367f0e2b118f23ec3eb591a3e269de3f5d8b0e0843ec4574b33c5f98e0344c4be38a26c25caccb4b6

    • SSDEEP

      3072:wwAlawAlawAlawAlawAlawAlawAlawAltU8xX2iqwq3QS:wwAYwAYwAYwAYwAYwAYwAYwA3dTqAS

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks