General

  • Target

    c7ffefaa549c25376e488ab4c7a41a09493bb962f68658e39a49ac7cb21dacdd

  • Size

    857KB

  • Sample

    241130-rl9yqawlct

  • MD5

    3bc8fe52f28307cf921da1f1bdc448fb

  • SHA1

    0a213e9c8ace169379f108ccba01793ddcdc07f0

  • SHA256

    c7ffefaa549c25376e488ab4c7a41a09493bb962f68658e39a49ac7cb21dacdd

  • SHA512

    660d600323d9cfacbbca1f897d66e517693d10a316edc59e95ed02532a46dde7d7d0af0dbc9b750e3ee70bc0cf1b74fbc7fd7bcb2a257ea5d22c704b212353e3

  • SSDEEP

    24576:deq38JBG088vRAwGdZHczQh3Xq6iLlCFEY:2XG78ijFXq6iLsKY

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      c7ffefaa549c25376e488ab4c7a41a09493bb962f68658e39a49ac7cb21dacdd

    • Size

      857KB

    • MD5

      3bc8fe52f28307cf921da1f1bdc448fb

    • SHA1

      0a213e9c8ace169379f108ccba01793ddcdc07f0

    • SHA256

      c7ffefaa549c25376e488ab4c7a41a09493bb962f68658e39a49ac7cb21dacdd

    • SHA512

      660d600323d9cfacbbca1f897d66e517693d10a316edc59e95ed02532a46dde7d7d0af0dbc9b750e3ee70bc0cf1b74fbc7fd7bcb2a257ea5d22c704b212353e3

    • SSDEEP

      24576:deq38JBG088vRAwGdZHczQh3Xq6iLlCFEY:2XG78ijFXq6iLsKY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks