General

  • Target

    6b5bfda5580a6bd8ec3062f4d33b09c0f91722d824e80ae0cb8d47e8b1b2fcb7.exe

  • Size

    77.0MB

  • Sample

    250110-r4sgdsxlg1

  • MD5

    7a6425553456c5f24bb5c8e235574c72

  • SHA1

    6d825e1a1238c4a4f26966c281507e5e704c5500

  • SHA256

    6b5bfda5580a6bd8ec3062f4d33b09c0f91722d824e80ae0cb8d47e8b1b2fcb7

  • SHA512

    1da622c9448297a1b2971dab7415586f9e31e113c8e39404d25ba9937e9b423a2f8d01ce772590a796ad9642c04b66a09f8b044d1b5707e696f686fc61cc6e47

  • SSDEEP

    24576:uu6J33O0c+JY5UZ+XC0kGso6Fa/ROfRojRhKC8CcXWY:gu0c++OCvkGs9Fa/syHKC8CrY

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      6b5bfda5580a6bd8ec3062f4d33b09c0f91722d824e80ae0cb8d47e8b1b2fcb7.exe

    • Size

      77.0MB

    • MD5

      7a6425553456c5f24bb5c8e235574c72

    • SHA1

      6d825e1a1238c4a4f26966c281507e5e704c5500

    • SHA256

      6b5bfda5580a6bd8ec3062f4d33b09c0f91722d824e80ae0cb8d47e8b1b2fcb7

    • SHA512

      1da622c9448297a1b2971dab7415586f9e31e113c8e39404d25ba9937e9b423a2f8d01ce772590a796ad9642c04b66a09f8b044d1b5707e696f686fc61cc6e47

    • SSDEEP

      24576:uu6J33O0c+JY5UZ+XC0kGso6Fa/ROfRojRhKC8CcXWY:gu0c++OCvkGs9Fa/syHKC8CrY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks