General

  • Target

    250e5e20c5bd9d1f74400122341e04e47b8f4a46d912691553009c6227114aaf

  • Size

    721KB

  • Sample

    241125-j2brvsxkhy

  • MD5

    a3589f82aaaeb0bd20ba6282a03c8115

  • SHA1

    ef533db99d6e976d3811fa1ab88aad91d4551aed

  • SHA256

    250e5e20c5bd9d1f74400122341e04e47b8f4a46d912691553009c6227114aaf

  • SHA512

    273918d5a55bc9adffdae0dad4aa7b3208fdcb9b84ecd4f3702e5934d3873a5e1e1262802fece2ff9741acb1163ff509524392817929b42bc41936fc9da4edfd

  • SSDEEP

    12288:LBD7NbeXekk9lY6xmOCC1MZMSu+72f2bim/rr8uOPXJstI8NtQfHqDIDh:LBteXD6EAeMSuj2morwfoLKPh

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      RFQ__PO_6353637355363-PDF____PDF.exe

    • Size

      750KB

    • MD5

      130040cd45252a0e1cabdc3f6398881c

    • SHA1

      948c573d9946d207de85e03df1f92680d88b2d42

    • SHA256

      8c1d7041e76efaf68b0c70000b850b3c80111d44114a421cb52e0d503947b96d

    • SHA512

      d465d96be19fdef320269d12170d258178bc078e2313b23a0d24a4b2e92db714851fe53a636a707d18a152fd4741cab33f70ad8e23bda06cb4d255172b5d4ad6

    • SSDEEP

      12288:rbeXOvvHy9lYZInZp3ZL2dnMZghB72/Mbim/fr8iOPXJAtISNtphdtxvWrUPb:XeXiZInZp3ZaJeg4MmofwbYr5dtxWrUz

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks