General

  • Target

    79d9270edbf86a9503b71bb27d04a88c1f8506fadad7b702adf97c5893f6cb14

  • Size

    772KB

  • Sample

    241201-w4mncssphk

  • MD5

    76f0f7efa38fee04f22a3836c7f8f2d3

  • SHA1

    68bccecfc0128f4542ffc35aa4a4644c3f9fff0e

  • SHA256

    79d9270edbf86a9503b71bb27d04a88c1f8506fadad7b702adf97c5893f6cb14

  • SHA512

    9f71c798af7d25ebdf63d5a7987bca41ba2ff3eb379a70b971730c9291a4f44238c4b3f66f9d38968315581424e801a49e9f24df0e53ed94a62184553b36bf1c

  • SSDEEP

    12288:TlqG7jVsASFomUxB/U7UYyDD34kNn71L2PC2jxxjbaS47pxfd/TJQ8XV7XkR:b7RSOxP/JYy33Dpd2xv4VhfQ8lm

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      79d9270edbf86a9503b71bb27d04a88c1f8506fadad7b702adf97c5893f6cb14

    • Size

      772KB

    • MD5

      76f0f7efa38fee04f22a3836c7f8f2d3

    • SHA1

      68bccecfc0128f4542ffc35aa4a4644c3f9fff0e

    • SHA256

      79d9270edbf86a9503b71bb27d04a88c1f8506fadad7b702adf97c5893f6cb14

    • SHA512

      9f71c798af7d25ebdf63d5a7987bca41ba2ff3eb379a70b971730c9291a4f44238c4b3f66f9d38968315581424e801a49e9f24df0e53ed94a62184553b36bf1c

    • SSDEEP

      12288:TlqG7jVsASFomUxB/U7UYyDD34kNn71L2PC2jxxjbaS47pxfd/TJQ8XV7XkR:b7RSOxP/JYy33Dpd2xv4VhfQ8lm

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks