General

  • Target

    be7d65953fc34188e7a7268d9e6727aa9ddcb5d81995f4f9ce1fd8b7552de157

  • Size

    583KB

  • Sample

    241216-2jmqhsskg1

  • MD5

    101909517ac18f83dab8b4d92acd14a2

  • SHA1

    8d13403c8814a1f0c5246c74203e86577444eb2c

  • SHA256

    be7d65953fc34188e7a7268d9e6727aa9ddcb5d81995f4f9ce1fd8b7552de157

  • SHA512

    022c82e0b0843a8457b5e0f5138e95724afa687673ccdf5af0d2cc07cfa413b106784aefda55d57269e5193ee695f57103ddc63150275c26e3b89938d0ae8a2f

  • SSDEEP

    12288:KL9HuUjgVxIUpob23s/kPWLfd4MMxauSioCMS6UCJHg4QfWGE:KgUjAIxws8yf5WauSie/JHJGE

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      PK241200518-EMAIL RELEASE-pdf.exe

    • Size

      983KB

    • MD5

      6897b3d43af4aca3376a79d7169746db

    • SHA1

      fec918d4e90a3697a78931ac4dab8dc6da637afb

    • SHA256

      23659bb599448db31b14bf56938cae2970929167fa41ad9d7e35cae65c1b4a64

    • SHA512

      5a7dda8f4340a7b56400da996ed24862bdada176ce228b20f9807babfc870a5b00e4be4521ace0e3032b32c715bba543aef35db92c599879b81c0b9d38dbc582

    • SSDEEP

      24576:Zu6J33O0c+JY5UZ+XC0kGso6Fa71mhxHTCWY:bu0c++OCvkGs9Fa71m3H1Y

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks