General

  • Target

    1d35d406169afe6bed77759d2e8e03c858897a7e181e3a83bb013f16c91af4bd.exe

  • Size

    737KB

  • Sample

    250110-cl72ss1jfm

  • MD5

    1579f7d1a5af2d811a9ade177ca3ed73

  • SHA1

    e126dbb23a1c841a934e5b73bcfebc1c28bd906d

  • SHA256

    1d35d406169afe6bed77759d2e8e03c858897a7e181e3a83bb013f16c91af4bd

  • SHA512

    2271e6c5c1494641f0d96a593b72a29203c0c4d1fc1440dc51a9784d3300a02bd6dfcf3a77f9efe8b84aef12b19097e0dd155dfe379536dca55d3e7cea135e30

  • SSDEEP

    12288:X4doaex+/ZpqCV8W4TFhPPAZD373dAGZ+WMTRnqdmqy+czNKFARjaNIkATn747og:IdFexZCV8jDIV3aWCRnkmqaNAARhN6

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      1d35d406169afe6bed77759d2e8e03c858897a7e181e3a83bb013f16c91af4bd.exe

    • Size

      737KB

    • MD5

      1579f7d1a5af2d811a9ade177ca3ed73

    • SHA1

      e126dbb23a1c841a934e5b73bcfebc1c28bd906d

    • SHA256

      1d35d406169afe6bed77759d2e8e03c858897a7e181e3a83bb013f16c91af4bd

    • SHA512

      2271e6c5c1494641f0d96a593b72a29203c0c4d1fc1440dc51a9784d3300a02bd6dfcf3a77f9efe8b84aef12b19097e0dd155dfe379536dca55d3e7cea135e30

    • SSDEEP

      12288:X4doaex+/ZpqCV8W4TFhPPAZD373dAGZ+WMTRnqdmqy+czNKFARjaNIkATn747og:IdFexZCV8jDIV3aWCRnkmqaNAARhN6

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks