General
-
Target
288c3ef10338b99d38a344433451dbb2aadcdc323e656670dae29d9cff5e1313
-
Size
934KB
-
Sample
241130-yetrgsxkgm
-
MD5
f1f5c3ac10d4a2b5ee41287be266697a
-
SHA1
cadfebb21927a50708216ce994d748c7c71fb7cb
-
SHA256
288c3ef10338b99d38a344433451dbb2aadcdc323e656670dae29d9cff5e1313
-
SHA512
b21d15994853bc485ad1198308ecab15310e44e2cd9b7a6528196816718bd27cc7be5baeb6c3b6ff15b860a8aa20a854cd6e39b266bcdade1c04484c2c1322a3
-
SSDEEP
24576:lFbved6FiFmV9xW8Hx6Wm95DXXyuZQJDAui:lVp7DHx6n95DXieQ6ui
Static task
static1
Behavioral task
behavioral1
Sample
288c3ef10338b99d38a344433451dbb2aadcdc323e656670dae29d9cff5e1313.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
288c3ef10338b99d38a344433451dbb2aadcdc323e656670dae29d9cff5e1313.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
cp1.virtualine.org - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Targets
-
-
Target
288c3ef10338b99d38a344433451dbb2aadcdc323e656670dae29d9cff5e1313
-
Size
934KB
-
MD5
f1f5c3ac10d4a2b5ee41287be266697a
-
SHA1
cadfebb21927a50708216ce994d748c7c71fb7cb
-
SHA256
288c3ef10338b99d38a344433451dbb2aadcdc323e656670dae29d9cff5e1313
-
SHA512
b21d15994853bc485ad1198308ecab15310e44e2cd9b7a6528196816718bd27cc7be5baeb6c3b6ff15b860a8aa20a854cd6e39b266bcdade1c04484c2c1322a3
-
SSDEEP
24576:lFbved6FiFmV9xW8Hx6Wm95DXXyuZQJDAui:lVp7DHx6n95DXieQ6ui
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2