General

  • Target

    A8BEEE89EB72948B3FD255C6A1F5BAB0300161AA0E32BA0AAFFE5653B75111D0

  • Size

    1.2MB

  • Sample

    250103-jqbmqaxqcp

  • MD5

    3f1ea031012dd9570640ac2d73ab63f2

  • SHA1

    63cef5603a782c7efd95b6ac23cc6286e1017d0e

  • SHA256

    a8beee89eb72948b3fd255c6a1f5bab0300161aa0e32ba0aaffe5653b75111d0

  • SHA512

    264251b60551158d9b34d59b3fd7a7c93487be3917d43d89dd3166f0f5cdc68c754c45c869331a51f3e99741763410c554fd06b7ad0cb6bced488866c2ac168f

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaCF3SKnMTmtxJZ/9ScW8fncift9XM9dCfOdyM:7JZoQrbTFZY1iaCFhZVBfnc8237

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      A8BEEE89EB72948B3FD255C6A1F5BAB0300161AA0E32BA0AAFFE5653B75111D0

    • Size

      1.2MB

    • MD5

      3f1ea031012dd9570640ac2d73ab63f2

    • SHA1

      63cef5603a782c7efd95b6ac23cc6286e1017d0e

    • SHA256

      a8beee89eb72948b3fd255c6a1f5bab0300161aa0e32ba0aaffe5653b75111d0

    • SHA512

      264251b60551158d9b34d59b3fd7a7c93487be3917d43d89dd3166f0f5cdc68c754c45c869331a51f3e99741763410c554fd06b7ad0cb6bced488866c2ac168f

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCF3SKnMTmtxJZ/9ScW8fncift9XM9dCfOdyM:7JZoQrbTFZY1iaCFhZVBfnc8237

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks