General

  • Target

    da0407f4df1fb7b5af96c81a21dd905852792693f10fb960930970d53ee1c3f8.exe

  • Size

    1.0MB

  • Sample

    250110-esyg2stqbq

  • MD5

    a4a64f5e476f06b0f9258edbe1aef13c

  • SHA1

    5c1a197a5d7c570c1fba5167e3f7865454fdf7d5

  • SHA256

    da0407f4df1fb7b5af96c81a21dd905852792693f10fb960930970d53ee1c3f8

  • SHA512

    f9e449e4019b69ff4a44d3692393c3921b930d90cb3cfb50e92e5545147957da1b003add70a57ad5d24269d052dc3c43d773dafc0bd7690532cbae26fc248009

  • SSDEEP

    24576:uksj30ivvE/4NGzOhLjvc3yfyF2+oSXiXu:6jki3E/40zOJjU2oesiX

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      da0407f4df1fb7b5af96c81a21dd905852792693f10fb960930970d53ee1c3f8.exe

    • Size

      1.0MB

    • MD5

      a4a64f5e476f06b0f9258edbe1aef13c

    • SHA1

      5c1a197a5d7c570c1fba5167e3f7865454fdf7d5

    • SHA256

      da0407f4df1fb7b5af96c81a21dd905852792693f10fb960930970d53ee1c3f8

    • SHA512

      f9e449e4019b69ff4a44d3692393c3921b930d90cb3cfb50e92e5545147957da1b003add70a57ad5d24269d052dc3c43d773dafc0bd7690532cbae26fc248009

    • SSDEEP

      24576:uksj30ivvE/4NGzOhLjvc3yfyF2+oSXiXu:6jki3E/40zOJjU2oesiX

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks