General

  • Target

    fef805cfe8df23b5e42e59c3505ba7b9014c2cf3e9ac9346b3badba3c086053c.exe

  • Size

    1.1MB

  • Sample

    250109-ex7araxrhy

  • MD5

    eb8c8acae9d3a669129902384f5335b2

  • SHA1

    f0f9aa5f20c2721eacc7e2b660c46b585b653ee2

  • SHA256

    fef805cfe8df23b5e42e59c3505ba7b9014c2cf3e9ac9346b3badba3c086053c

  • SHA512

    5c62016f2b7b6fbfdba82539effc1c9dd65e0a3bc0df92210637d500562cfae01572866578a57d080c3247433da0f5845688adef74fd7467d08c7ba564c74fa3

  • SSDEEP

    24576:9qDEvCTbMWu7rQYlBQcBiT6rprG8aeMExfQ:9TvC/MTQYxsWR7aeMk

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      fef805cfe8df23b5e42e59c3505ba7b9014c2cf3e9ac9346b3badba3c086053c.exe

    • Size

      1.1MB

    • MD5

      eb8c8acae9d3a669129902384f5335b2

    • SHA1

      f0f9aa5f20c2721eacc7e2b660c46b585b653ee2

    • SHA256

      fef805cfe8df23b5e42e59c3505ba7b9014c2cf3e9ac9346b3badba3c086053c

    • SHA512

      5c62016f2b7b6fbfdba82539effc1c9dd65e0a3bc0df92210637d500562cfae01572866578a57d080c3247433da0f5845688adef74fd7467d08c7ba564c74fa3

    • SSDEEP

      24576:9qDEvCTbMWu7rQYlBQcBiT6rprG8aeMExfQ:9TvC/MTQYxsWR7aeMk

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks