General

  • Target

    c5b76fe73e687fb53adc1e5a6c3c8bee508645a8bcd1fc81e0b373bfd473f31e

  • Size

    643KB

  • Sample

    241129-n5mezsyngn

  • MD5

    fb77743fb2868b9084d818d55804b921

  • SHA1

    ce3c82848aa61a60110ca06e7e982472c6e136c7

  • SHA256

    c5b76fe73e687fb53adc1e5a6c3c8bee508645a8bcd1fc81e0b373bfd473f31e

  • SHA512

    553807aac3d9fd50698e25a15d8990ddc92ddad3d493c897a18cbafac8b1529ddde189987ef836d96a76c63dea98f1010a7d1df09f1d03597db105ed2acbf9aa

  • SSDEEP

    12288:YQLE2iG40uBkUqyAHkbSPQ9yKNKDLsGuintEa4Ng5cZAdzJNRX9l7K1xMffYHx:YQY1G4HV7R9suieJg5iA1vRKCfYR

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      FAT67890000.bat

    • Size

      734KB

    • MD5

      6130fea8d605e639b6bbe21a0769a09a

    • SHA1

      b5392133c960cad99cfa21c56d4b946022759466

    • SHA256

      73298a0854979b419d3178e21ad507fe32df379d5d710426b40d67925d7b70bf

    • SHA512

      d31dda1691fa55344cb4ee40378ac65b649da564fd4364854788a851b5a9e9fcc2c6e4b1e052c24b97df88b460fd92bc2c41a1dad450c960eaf7580320f9a80f

    • SSDEEP

      12288:f2iNCd/06PkU8ymBkbSd292ovKHLoyuintyaYZ4DcZABzJNRXPW4Gsyo9e+sv+Ss:f1MdpRft9suig/4DiAZgTo9eOxj

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks