General

  • Target

    1d135aabc5c61511e10b6a3c22ae0631f591cbdb35fcc6e811b9acdf1327a691

  • Size

    726KB

  • Sample

    241204-xqgevswmfw

  • MD5

    eaa6b1bbfbcc0e09adf7c308c0b12fa4

  • SHA1

    8de0e68d76ab0a36e95f5ecf36fd3618509a737b

  • SHA256

    1d135aabc5c61511e10b6a3c22ae0631f591cbdb35fcc6e811b9acdf1327a691

  • SHA512

    c36e96a22567a697ca5de4078f0a9c80c634b6b7e0320692e9b24c295fbccab156bb8e5ea41f1e8f5d8a8f488b80e93798dd727a67115fb5489e4786d3798d40

  • SSDEEP

    12288:px/hei2besC9QbsjEAw6Lj4EF9TDNbumZ6lrPp9Btx67w5usx+Xt:gbhL84EbTDNb9mrPpH67wx

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      1d135aabc5c61511e10b6a3c22ae0631f591cbdb35fcc6e811b9acdf1327a691

    • Size

      726KB

    • MD5

      eaa6b1bbfbcc0e09adf7c308c0b12fa4

    • SHA1

      8de0e68d76ab0a36e95f5ecf36fd3618509a737b

    • SHA256

      1d135aabc5c61511e10b6a3c22ae0631f591cbdb35fcc6e811b9acdf1327a691

    • SHA512

      c36e96a22567a697ca5de4078f0a9c80c634b6b7e0320692e9b24c295fbccab156bb8e5ea41f1e8f5d8a8f488b80e93798dd727a67115fb5489e4786d3798d40

    • SSDEEP

      12288:px/hei2besC9QbsjEAw6Lj4EF9TDNbumZ6lrPp9Btx67w5usx+Xt:gbhL84EbTDNb9mrPpH67wx

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks