General

  • Target

    1ab57c3722041788277908522650c68f137e173a4862aab5ac10b6d3ea1d7ef5.exe

  • Size

    1.0MB

  • Sample

    250110-clxwtsykds

  • MD5

    170c62d3ca5f52d7307613cc070194b7

  • SHA1

    41c97a3f21f9e5c9d636f3228c780baea6fe9b09

  • SHA256

    1ab57c3722041788277908522650c68f137e173a4862aab5ac10b6d3ea1d7ef5

  • SHA512

    75b562adaf41d495715788a7f5e22158cc6de7c1498bea41a43a9e1c03f54d1e6d8e25a28fba157904ef83702dbcd278fa8dda6e00fd9e33c3fbf3af76acb835

  • SSDEEP

    24576:Wbj30ivvE/4NPy/j+oHTblXCPjm7kTyd:0jki3E/4y+oHxC67qyd

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      1ab57c3722041788277908522650c68f137e173a4862aab5ac10b6d3ea1d7ef5.exe

    • Size

      1.0MB

    • MD5

      170c62d3ca5f52d7307613cc070194b7

    • SHA1

      41c97a3f21f9e5c9d636f3228c780baea6fe9b09

    • SHA256

      1ab57c3722041788277908522650c68f137e173a4862aab5ac10b6d3ea1d7ef5

    • SHA512

      75b562adaf41d495715788a7f5e22158cc6de7c1498bea41a43a9e1c03f54d1e6d8e25a28fba157904ef83702dbcd278fa8dda6e00fd9e33c3fbf3af76acb835

    • SSDEEP

      24576:Wbj30ivvE/4NPy/j+oHTblXCPjm7kTyd:0jki3E/4y+oHxC67qyd

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks