General

  • Target

    1AA7A2EDE1DDDB0B8F00DF09CB4236BA56CC111177E60E5A0FCD6F816E977CBD

  • Size

    1.1MB

  • Sample

    250103-jnellavkcy

  • MD5

    9af0f0ddfe52b1da752e9f2e83c85581

  • SHA1

    9159999473bbf9e1800a2b4e26f11a4fc2b7aaf7

  • SHA256

    1aa7a2ede1dddb0b8f00df09cb4236ba56cc111177e60e5a0fcd6f816e977cbd

  • SHA512

    72c06c7f7672435265faa9b6eed48e1f51aaf415c7e50291c3258e0ba05b1f8b5a6d0b4d5ea90734c7e0c5e8600ba869d0ac3cdff1f952068263d20ae2fa8bb4

  • SSDEEP

    24576:IAHnh+eWsN3skA4RV1Hom2KXMmHalXT/tH1YMQq7p5:Ph+ZkldoPK8YalXTp1HQq3

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      1AA7A2EDE1DDDB0B8F00DF09CB4236BA56CC111177E60E5A0FCD6F816E977CBD

    • Size

      1.1MB

    • MD5

      9af0f0ddfe52b1da752e9f2e83c85581

    • SHA1

      9159999473bbf9e1800a2b4e26f11a4fc2b7aaf7

    • SHA256

      1aa7a2ede1dddb0b8f00df09cb4236ba56cc111177e60e5a0fcd6f816e977cbd

    • SHA512

      72c06c7f7672435265faa9b6eed48e1f51aaf415c7e50291c3258e0ba05b1f8b5a6d0b4d5ea90734c7e0c5e8600ba869d0ac3cdff1f952068263d20ae2fa8bb4

    • SSDEEP

      24576:IAHnh+eWsN3skA4RV1Hom2KXMmHalXT/tH1YMQq7p5:Ph+ZkldoPK8YalXTp1HQq3

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks