General

  • Target

    049c9844f5de5a3b4271f6388a4de33e3c38d269afdf2287f72a366356fe216d.exe

  • Size

    737KB

  • Sample

    241126-1y5n7ssjhz

  • MD5

    7b155f3766ea84a27cef0dea8d040634

  • SHA1

    b94d1874022ec59b6f077b58132945cb736aa079

  • SHA256

    049c9844f5de5a3b4271f6388a4de33e3c38d269afdf2287f72a366356fe216d

  • SHA512

    7b577829799431147af6f36a204e3ec5e4378da78f58699b3abe728657bf0016584769c8c033e807c2a8ca590dc6eb82b8282498b2000e3f544b2bf0b42f6019

  • SSDEEP

    12288:12sqEOzNebb4ldH6nzjnuiSWOkfpyoF0ensAjb1IF7lacNc:12sqEOzE/OH6zjnOupsenpxIxlaWc

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      049c9844f5de5a3b4271f6388a4de33e3c38d269afdf2287f72a366356fe216d.exe

    • Size

      737KB

    • MD5

      7b155f3766ea84a27cef0dea8d040634

    • SHA1

      b94d1874022ec59b6f077b58132945cb736aa079

    • SHA256

      049c9844f5de5a3b4271f6388a4de33e3c38d269afdf2287f72a366356fe216d

    • SHA512

      7b577829799431147af6f36a204e3ec5e4378da78f58699b3abe728657bf0016584769c8c033e807c2a8ca590dc6eb82b8282498b2000e3f544b2bf0b42f6019

    • SSDEEP

      12288:12sqEOzNebb4ldH6nzjnuiSWOkfpyoF0ensAjb1IF7lacNc:12sqEOzE/OH6zjnOupsenpxIxlaWc

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks