General

  • Target

    denizbank25.11.2024E80aspc.exe

  • Size

    737KB

  • Sample

    241125-mtz19syrbk

  • MD5

    99334c137b21036493a00305cd3189da

  • SHA1

    3f4e22efc054a79fe7f1644b564f7a78d438f497

  • SHA256

    4e3703fac7cd57231af4066573369bddffd7d7c0f8d0c4b2d0fc006c42b87dcc

  • SHA512

    b734366e0678853abdf0e4704abeb88a545156b210d2243f9019e2506f40e6ba640f74b069e1753305245bd1a7376ff9dff462661419a52100e0d1901c976406

  • SSDEEP

    12288:h15vH3RbeXyL05XULmZtHnZW11dSduUmDAqpNjm8M4FK/e3LsNejj1x9/:hnvH35eXNYulnZ6dSTmDQ8LE/APj1n

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      denizbank25.11.2024E80aspc.exe

    • Size

      737KB

    • MD5

      99334c137b21036493a00305cd3189da

    • SHA1

      3f4e22efc054a79fe7f1644b564f7a78d438f497

    • SHA256

      4e3703fac7cd57231af4066573369bddffd7d7c0f8d0c4b2d0fc006c42b87dcc

    • SHA512

      b734366e0678853abdf0e4704abeb88a545156b210d2243f9019e2506f40e6ba640f74b069e1753305245bd1a7376ff9dff462661419a52100e0d1901c976406

    • SSDEEP

      12288:h15vH3RbeXyL05XULmZtHnZW11dSduUmDAqpNjm8M4FK/e3LsNejj1x9/:hnvH35eXNYulnZ6dSTmDQ8LE/APj1n

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks