General

  • Target

    DEC 2024 RFQ.exe

  • Size

    987KB

  • Sample

    241211-jttmpstney

  • MD5

    34b4d7918dc670f64013e5d1f58a85cd

  • SHA1

    dc5af092e9c5b2b38a2e72b03a2784fad36f20e6

  • SHA256

    3a0034689c3ef94d1e243b02eeca73fa564da13b1f09509d9cc290240ccc2b17

  • SHA512

    080f3df60bff200c4d29a65eb67dcc381bc04200c5b6e3681b2592ef64aa776e04cb71e8966b8cb56c42577cbc2be89ff8beb1e1d99ff54f1d18a7fdd2102907

  • SSDEEP

    24576:tu6J33O0c+JY5UZ+XC0kGso6FaSrQ00voPIWY:fu0c++OCvkGs9FaSrZ0wDY

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      DEC 2024 RFQ.exe

    • Size

      987KB

    • MD5

      34b4d7918dc670f64013e5d1f58a85cd

    • SHA1

      dc5af092e9c5b2b38a2e72b03a2784fad36f20e6

    • SHA256

      3a0034689c3ef94d1e243b02eeca73fa564da13b1f09509d9cc290240ccc2b17

    • SHA512

      080f3df60bff200c4d29a65eb67dcc381bc04200c5b6e3681b2592ef64aa776e04cb71e8966b8cb56c42577cbc2be89ff8beb1e1d99ff54f1d18a7fdd2102907

    • SSDEEP

      24576:tu6J33O0c+JY5UZ+XC0kGso6FaSrQ00voPIWY:fu0c++OCvkGs9FaSrZ0wDY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks