General

  • Target

    tmp1u2e_efl

  • Size

    803KB

  • Sample

    241129-nnznzssrbz

  • MD5

    4123e0b7da19f26d9e99e29e7a618911

  • SHA1

    430b1daf4bb38220b3dc85a1b34c0b1b532a1f01

  • SHA256

    6c9e54f7f42bd5c8c7e8dc0c34ba0961d95513db27c854ce83e8206d6f4c1b9b

  • SHA512

    c5b588612b4d58231e74b10fb2bdf1369aa03752333950ef8b61a43f2e2b64bed8da52a1ec68c63030a6f3686a21c43eccb0562d873fa05e6780d24242f58aa8

  • SSDEEP

    24576:61MqxjvCNra98jjW4wYOI5fHsAbXWgaoOz:6mqIMQDjOCTWg

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      tmp1u2e_efl

    • Size

      803KB

    • MD5

      4123e0b7da19f26d9e99e29e7a618911

    • SHA1

      430b1daf4bb38220b3dc85a1b34c0b1b532a1f01

    • SHA256

      6c9e54f7f42bd5c8c7e8dc0c34ba0961d95513db27c854ce83e8206d6f4c1b9b

    • SHA512

      c5b588612b4d58231e74b10fb2bdf1369aa03752333950ef8b61a43f2e2b64bed8da52a1ec68c63030a6f3686a21c43eccb0562d873fa05e6780d24242f58aa8

    • SSDEEP

      24576:61MqxjvCNra98jjW4wYOI5fHsAbXWgaoOz:6mqIMQDjOCTWg

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks