General

  • Target

    C5A86B58808EBD6AE9AAD090CEF1C578536B854F41A97550E03AD9D1D325DFEF

  • Size

    1.1MB

  • Sample

    250103-jql4fsvmcy

  • MD5

    82bf37088e15de82e529a21a02e7fdf0

  • SHA1

    11298243288e3d4224c9a4f9f55d6e2ae7690f2b

  • SHA256

    c5a86b58808ebd6ae9aad090cef1c578536b854f41a97550e03ad9d1d325dfef

  • SHA512

    80c84ae6a38ba75a8d163ecfbd7eb5b6474e6f552e3a852b485c6d97b8a86387c32cf0bcdfd7a03d60beb9ec8a47223a19bf037fc6006fcd7ae6ccbe866df657

  • SSDEEP

    24576:hAHnh+eWsN3skA4RV1Hom2KXMmHaL05EllSdvarUO5:4h+ZkldoPK8YaL05aSdvard

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      C5A86B58808EBD6AE9AAD090CEF1C578536B854F41A97550E03AD9D1D325DFEF

    • Size

      1.1MB

    • MD5

      82bf37088e15de82e529a21a02e7fdf0

    • SHA1

      11298243288e3d4224c9a4f9f55d6e2ae7690f2b

    • SHA256

      c5a86b58808ebd6ae9aad090cef1c578536b854f41a97550e03ad9d1d325dfef

    • SHA512

      80c84ae6a38ba75a8d163ecfbd7eb5b6474e6f552e3a852b485c6d97b8a86387c32cf0bcdfd7a03d60beb9ec8a47223a19bf037fc6006fcd7ae6ccbe866df657

    • SSDEEP

      24576:hAHnh+eWsN3skA4RV1Hom2KXMmHaL05EllSdvarUO5:4h+ZkldoPK8YaL05aSdvard

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks