General

  • Target

    c601b7278ae5a7b4f09e71209054c91aa77e5b11484f970fe5227715463df152

  • Size

    721KB

  • Sample

    241125-jyepcaxjgv

  • MD5

    bec851de65c0c36b96841f5ed3363536

  • SHA1

    e00dd64ec4c1810396303e8288240f1e7fa6d7a0

  • SHA256

    c601b7278ae5a7b4f09e71209054c91aa77e5b11484f970fe5227715463df152

  • SHA512

    7fecb816ea7df1ffa14452835c1c890c2715f42504a85d172250a328470fe534a9a57c32cec9c1bf025b9c4e8dd2893f675fd02dc1ea9a31f3a6055296f82599

  • SSDEEP

    12288:oWfpQ7suwPO/AxRJ4dFkc+KnhnweBEyX/cde6gHhAnbRKQ3XHvK:/Q7suwWIJ8rhnwwd/cde6gikQXPK

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      INQUIRY_pdf.exe

    • Size

      749KB

    • MD5

      3885966389f63ca00a45ff5aa413ec37

    • SHA1

      b154cc76e443fa9b3f697a430c95146e5d7261f3

    • SHA256

      0c8cf2991746319e1f1782ad0677c671abc6c3b53129fcbafd93ede7e60c4a8b

    • SHA512

      330b6f2f09ae9600134e4280f1a7b9f92ddc44b6fcb107bb42285eb810cb408a05b6c5f6b113991a6d365d37757caacf6f0315a3f75a1a6092d24fcb0501dfb9

    • SSDEEP

      12288:kbeXO/k6POZAJZhwDFkc+shhna2BE6tRcbi+gwrHBAnfBKPtM:KeXGk6WShoxhnaIRRc++guCAV

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks