General

  • Target

    dda809f369a6369d2d26e75ff6cf321d2fe052f3eb0074f227065906bb2af531.exe

  • Size

    901KB

  • Sample

    241128-d7xnmaznal

  • MD5

    fe3c062c09ea9fc35048f708cb95ecb1

  • SHA1

    118dbd2be3e9033b57282cb1c3e188d3c3141364

  • SHA256

    dda809f369a6369d2d26e75ff6cf321d2fe052f3eb0074f227065906bb2af531

  • SHA512

    80eec66e3e4beb210f7e94a4ffcb82f37a1d3ff07e7bd4599676233ed3585e2d51b81359e3f40f55bb7009bde5e9f3cd31624ba0a8f8645f8e31d4de5ebdefad

  • SSDEEP

    12288:GSpgdcAijOeKiMd3CRKoeSW/Z24gvar6iUUJGl3HxIE:GAAMKiO3y98EoLJGJF

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      dda809f369a6369d2d26e75ff6cf321d2fe052f3eb0074f227065906bb2af531.exe

    • Size

      901KB

    • MD5

      fe3c062c09ea9fc35048f708cb95ecb1

    • SHA1

      118dbd2be3e9033b57282cb1c3e188d3c3141364

    • SHA256

      dda809f369a6369d2d26e75ff6cf321d2fe052f3eb0074f227065906bb2af531

    • SHA512

      80eec66e3e4beb210f7e94a4ffcb82f37a1d3ff07e7bd4599676233ed3585e2d51b81359e3f40f55bb7009bde5e9f3cd31624ba0a8f8645f8e31d4de5ebdefad

    • SSDEEP

      12288:GSpgdcAijOeKiMd3CRKoeSW/Z24gvar6iUUJGl3HxIE:GAAMKiO3y98EoLJGJF

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks