General

  • Target

    3c4fda077af7875169803f444264b41c2c6cc4d20545792762aebd852671176c

  • Size

    992KB

  • Sample

    241122-1gyvbswlap

  • MD5

    6a6311e2779309f14eb94cfb1788b259

  • SHA1

    06b63e26c3e052f5603256aceb123aa4c3ab4ffb

  • SHA256

    3c4fda077af7875169803f444264b41c2c6cc4d20545792762aebd852671176c

  • SHA512

    427d759e303659ace15755d08069f2788a89a3c74a59e4d80b4a103b625dbeb49c1b94550813957d3080b3353b412b5e3f1a0ab75dcbf7afff9d554dc5c49ab6

  • SSDEEP

    24576:KzqAzxWGp0bSQPqddTIPkitKTbmvGzXk:KzquWGWbSKqddC8TbmvGzX

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      3c4fda077af7875169803f444264b41c2c6cc4d20545792762aebd852671176c

    • Size

      992KB

    • MD5

      6a6311e2779309f14eb94cfb1788b259

    • SHA1

      06b63e26c3e052f5603256aceb123aa4c3ab4ffb

    • SHA256

      3c4fda077af7875169803f444264b41c2c6cc4d20545792762aebd852671176c

    • SHA512

      427d759e303659ace15755d08069f2788a89a3c74a59e4d80b4a103b625dbeb49c1b94550813957d3080b3353b412b5e3f1a0ab75dcbf7afff9d554dc5c49ab6

    • SSDEEP

      24576:KzqAzxWGp0bSQPqddTIPkitKTbmvGzXk:KzquWGWbSKqddC8TbmvGzX

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks