General
-
Target
c5b76fe73e687fb53adc1e5a6c3c8bee508645a8bcd1fc81e0b373bfd473f31e
-
Size
643KB
-
Sample
241129-n5mezsyngn
-
MD5
fb77743fb2868b9084d818d55804b921
-
SHA1
ce3c82848aa61a60110ca06e7e982472c6e136c7
-
SHA256
c5b76fe73e687fb53adc1e5a6c3c8bee508645a8bcd1fc81e0b373bfd473f31e
-
SHA512
553807aac3d9fd50698e25a15d8990ddc92ddad3d493c897a18cbafac8b1529ddde189987ef836d96a76c63dea98f1010a7d1df09f1d03597db105ed2acbf9aa
-
SSDEEP
12288:YQLE2iG40uBkUqyAHkbSPQ9yKNKDLsGuintEa4Ng5cZAdzJNRX9l7K1xMffYHx:YQY1G4HV7R9suieJg5iA1vRKCfYR
Static task
static1
Behavioral task
behavioral1
Sample
FAT67890000.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FAT67890000.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Targets
-
-
Target
FAT67890000.bat
-
Size
734KB
-
MD5
6130fea8d605e639b6bbe21a0769a09a
-
SHA1
b5392133c960cad99cfa21c56d4b946022759466
-
SHA256
73298a0854979b419d3178e21ad507fe32df379d5d710426b40d67925d7b70bf
-
SHA512
d31dda1691fa55344cb4ee40378ac65b649da564fd4364854788a851b5a9e9fcc2c6e4b1e052c24b97df88b460fd92bc2c41a1dad450c960eaf7580320f9a80f
-
SSDEEP
12288:f2iNCd/06PkU8ymBkbSd292ovKHLoyuintyaYZ4DcZABzJNRXPW4Gsyo9e+sv+Ss:f1MdpRft9suig/4DiAZgTo9eOxj
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2