General

  • Target

    b8e36e21e76b4d3ca6522c040919442826e8559bc4f627fc1f2d5d138b2c4418

  • Size

    675KB

  • Sample

    250107-r4d9rsxlgr

  • MD5

    7d5f9ba2e3e7f5414e9bbd0f17c778c7

  • SHA1

    0b328920c1ee1c7460708fd8f8f5c4cb49557f43

  • SHA256

    b8e36e21e76b4d3ca6522c040919442826e8559bc4f627fc1f2d5d138b2c4418

  • SHA512

    0b8a1c7457b28caf36b3e43863ec885f0f0567a8563ec827c00ad776fb264cd27f859c177dc6cb1d05da387faf7de122c4062c6dae88e5f8b6485d3ae1254362

  • SSDEEP

    12288:AJO/ybKp64FdFC3O4ru7e8nwH7bJ91B0T+jiZ20tk7nOz2hZSjHYNGY:ebKMweh8wHBySjWfi7nOISj4NGY

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      Request For Quotation (R24925) for Spares_01072025_pdf..exe

    • Size

      819KB

    • MD5

      bd4b090eaa1061d4b394b150493915be

    • SHA1

      d24bcd580f642e0a46f5f0f27afc488a0fd59204

    • SHA256

      abb4db3fe48bd796df4b07f0cc5cc63fe1f92170e0dd5f2ee4de5e88888abf21

    • SHA512

      488702cd50abed14684715aad006411ccf548c1425b30025045890837765fd83204cad82603c9207dcefbf703ea3215c2ef1f186ea609f3c61525a018991c177

    • SSDEEP

      24576:HxGRguk+bKr17CPmCMP0Lapruvdi32kc7u:H1uk2lmCyMapr2

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks