General

  • Target

    c35fe2982c10692b54cf8997652a6fed6bd6c9192b72762e9022f167d082cf28.exe

  • Size

    1.1MB

  • Sample

    241122-knmsmsxpay

  • MD5

    7795c4e98223a2d100e2fe9579905430

  • SHA1

    77f2964fc77174112a99e505c010e618b57fdbaa

  • SHA256

    c35fe2982c10692b54cf8997652a6fed6bd6c9192b72762e9022f167d082cf28

  • SHA512

    bbe45c0b7b1d37114e53dafe620889e62b1b97466229d8a8a8e629c9c6aa74a58ef8617a53ad527e0bbc5f23327b3e03147d76632f884b36a32591de281e45be

  • SSDEEP

    12288:h2qg/s0y5YcxaVP8vSgwnSq6PnSU9n8L/mNgmRnslLA0ylZf1SLicDiriut+uXeH:5gHcoPRjhmSU98LUdmLA0y/1SucUUIeH

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      c35fe2982c10692b54cf8997652a6fed6bd6c9192b72762e9022f167d082cf28.exe

    • Size

      1.1MB

    • MD5

      7795c4e98223a2d100e2fe9579905430

    • SHA1

      77f2964fc77174112a99e505c010e618b57fdbaa

    • SHA256

      c35fe2982c10692b54cf8997652a6fed6bd6c9192b72762e9022f167d082cf28

    • SHA512

      bbe45c0b7b1d37114e53dafe620889e62b1b97466229d8a8a8e629c9c6aa74a58ef8617a53ad527e0bbc5f23327b3e03147d76632f884b36a32591de281e45be

    • SSDEEP

      12288:h2qg/s0y5YcxaVP8vSgwnSq6PnSU9n8L/mNgmRnslLA0ylZf1SLicDiriut+uXeH:5gHcoPRjhmSU98LUdmLA0y/1SucUUIeH

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks