General

  • Target

    w1svdfWNYHVYMjK.rtf

  • Size

    389KB

  • Sample

    241119-xn6xqsvpdj

  • MD5

    e78429a983cb429973b1227b19a41d36

  • SHA1

    fef2461dd913865e8cf4f7a96ba771afa7a4c24f

  • SHA256

    05112b680930bb43c94cb3b566540e9740e058d8bc6c36fdd1f9e018abec3544

  • SHA512

    48fc172ecc95483e54981989abe259a4892e226caa40b9710a0fc1758f9531fe2788a9275f1537fd3458d6c3624e4c28b7c3e21571961d368609cc76e2908823

  • SSDEEP

    6144:wwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAQXE5ZeO:h

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      w1svdfWNYHVYMjK.rtf

    • Size

      389KB

    • MD5

      e78429a983cb429973b1227b19a41d36

    • SHA1

      fef2461dd913865e8cf4f7a96ba771afa7a4c24f

    • SHA256

      05112b680930bb43c94cb3b566540e9740e058d8bc6c36fdd1f9e018abec3544

    • SHA512

      48fc172ecc95483e54981989abe259a4892e226caa40b9710a0fc1758f9531fe2788a9275f1537fd3458d6c3624e4c28b7c3e21571961d368609cc76e2908823

    • SSDEEP

      6144:wwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAQXE5ZeO:h

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks