General

  • Target

    6fb7fe42c59823ef194649957081731de8896d1b6c404bb8cd2298ccfb4b8f14

  • Size

    751KB

  • Sample

    241128-rc34tazlat

  • MD5

    114a9ae8a742367cbade2805fff079ad

  • SHA1

    f6ffe003ba5a1ff0d727c0b55400ad4ca550529e

  • SHA256

    6fb7fe42c59823ef194649957081731de8896d1b6c404bb8cd2298ccfb4b8f14

  • SHA512

    44f6b18cd55c2a86bb9c637ba2c4366c962baf370c0ebbb9b7ef6d9d1b76446958edb135b395de894e26357a4ca9a68ac64d8a6173413997e5d8f1e1e7e5a4c8

  • SSDEEP

    12288:Vl/WMPf960WWAv2LalBqUt98Ano8TjtlmI6ij9HeYOLmzyLuPBWM2StxndZJaP5L:n/b9NW9v2LalBPt5o8vt0Yj9+YdOLuPw

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      6DS7KZK3CK2rh9B.exe

    • Size

      815KB

    • MD5

      f7dc71b581befdb65f658fa73ce4ac12

    • SHA1

      8519725d40e32e7015a0a0a759f41758c760186a

    • SHA256

      54e358abb5eb4a81a5c21dcccf8d079ba34fd8503a5113c86e747af149607f2c

    • SHA512

      438e8e0035b65e6be1f637048572402a4296f65dcf5056fddc1416f94344da78039cb1cfbed7597ac5d76dae109483db03cf328506005ccdfefc60b00543ceae

    • SSDEEP

      24576:w2xjVihrX2hax5vtN8IF5GEEj9Yq0gLOPBgJLCnYnJ:jnSrX+uVN8Ib8DQBvnY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks