General

  • Target

    018ec8c62c4bbba1b127dc56971f2fd7022d9c9ba5493c8685c83c6ec322dd7a.r00

  • Size

    708KB

  • Sample

    241122-cfyaeaxrbn

  • MD5

    553f02240db5378cf4269057603ffd06

  • SHA1

    2b34482854a910115051fc2a26636eec40c5cdc9

  • SHA256

    018ec8c62c4bbba1b127dc56971f2fd7022d9c9ba5493c8685c83c6ec322dd7a

  • SHA512

    c4075b42633c8d895cba2b0b47cb5b903346e8dc2bc5915e718694bba6b061bfc3eb54d7e69d589f80919a8e939f446490a6d629bb3774b414628134b7d23c3a

  • SSDEEP

    12288:9IuZxefQ2MiYEELL3lgFhD2NEOJElwaxshvF83R9uKb3U8TJPoU/B:bZxGQ26pLVgFx8El3Khadbk8TJgSB

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Request for Quotation MK FMHS.RFQ.24.11.21.bat

    • Size

      994KB

    • MD5

      1ae7a890014eba9c807c6adeabac7671

    • SHA1

      e3b92645849a3e064d9fc401badf115dab013839

    • SHA256

      bba1825bd893328442cb891a35420a5da41a5431d1ade643f085c5992e763d3a

    • SHA512

      3a54469caeb4052cb4b842b30292e5ae00c9bf2a29f0d293d975d7bd0283d657c2fb4c9fd0df0797782eda78474a9eab5f8fa6d1ff66ceaf59f00e128fbab2d7

    • SSDEEP

      24576:Yij0gzjizxWgioJqE9p9jzOtXGnwaEalbcHNGtAlUDRL:1zjkW2H9p9PmXMOHNzUDB

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks