General

  • Target

    6964e678bccc61457b0d3f3ea6264d7c1e92d33802fffbb59f2f3c15f9dc5656.exe

  • Size

    874KB

  • Sample

    250110-c1244aypfz

  • MD5

    3e9b50da2409b41170a088fc4bb0e5f1

  • SHA1

    7cbeabc06f45357344cdc6c876a1ecdb90b685da

  • SHA256

    6964e678bccc61457b0d3f3ea6264d7c1e92d33802fffbb59f2f3c15f9dc5656

  • SHA512

    91a2bc914c3b798c88c9af73e38ea76e1321ecb273778e46af3d9a2ef24b626f3b40c1247b286383febe5044773f8113ef706cbed2262c831043b10b820fcf72

  • SSDEEP

    12288:fFCuDcWYMV+I4MVKWkUcfiuQ0PBgyxJbDfkDfbZtgpktca+ewex9VlVQn1Zrpj:FYGRgxxpWcJbsZqU+e/7VlVE

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      6964e678bccc61457b0d3f3ea6264d7c1e92d33802fffbb59f2f3c15f9dc5656.exe

    • Size

      874KB

    • MD5

      3e9b50da2409b41170a088fc4bb0e5f1

    • SHA1

      7cbeabc06f45357344cdc6c876a1ecdb90b685da

    • SHA256

      6964e678bccc61457b0d3f3ea6264d7c1e92d33802fffbb59f2f3c15f9dc5656

    • SHA512

      91a2bc914c3b798c88c9af73e38ea76e1321ecb273778e46af3d9a2ef24b626f3b40c1247b286383febe5044773f8113ef706cbed2262c831043b10b820fcf72

    • SSDEEP

      12288:fFCuDcWYMV+I4MVKWkUcfiuQ0PBgyxJbDfkDfbZtgpktca+ewex9VlVQn1Zrpj:FYGRgxxpWcJbsZqU+e/7VlVE

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks