General

  • Target

    23659bb599448db31b14bf56938cae2970929167fa41ad9d7e35cae65c1b4a64.exe

  • Size

    983KB

  • Sample

    241218-ctz16aznck

  • MD5

    6897b3d43af4aca3376a79d7169746db

  • SHA1

    fec918d4e90a3697a78931ac4dab8dc6da637afb

  • SHA256

    23659bb599448db31b14bf56938cae2970929167fa41ad9d7e35cae65c1b4a64

  • SHA512

    5a7dda8f4340a7b56400da996ed24862bdada176ce228b20f9807babfc870a5b00e4be4521ace0e3032b32c715bba543aef35db92c599879b81c0b9d38dbc582

  • SSDEEP

    24576:Zu6J33O0c+JY5UZ+XC0kGso6Fa71mhxHTCWY:bu0c++OCvkGs9Fa71m3H1Y

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      23659bb599448db31b14bf56938cae2970929167fa41ad9d7e35cae65c1b4a64.exe

    • Size

      983KB

    • MD5

      6897b3d43af4aca3376a79d7169746db

    • SHA1

      fec918d4e90a3697a78931ac4dab8dc6da637afb

    • SHA256

      23659bb599448db31b14bf56938cae2970929167fa41ad9d7e35cae65c1b4a64

    • SHA512

      5a7dda8f4340a7b56400da996ed24862bdada176ce228b20f9807babfc870a5b00e4be4521ace0e3032b32c715bba543aef35db92c599879b81c0b9d38dbc582

    • SSDEEP

      24576:Zu6J33O0c+JY5UZ+XC0kGso6Fa71mhxHTCWY:bu0c++OCvkGs9Fa71m3H1Y

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks