General

  • Target

    PO17971.exe

  • Size

    669KB

  • Sample

    250110-rdxy7aykfr

  • MD5

    7a01ce7b443e4c2f5344ef3ec0e21538

  • SHA1

    90f517920d408f9db6cdbeb6f67ba7c62708c851

  • SHA256

    ee6993e7afbf9a039db981542c0250e22fcaa01434db911732851c9e52bb38b6

  • SHA512

    9d14f5fd61cad5696b70bb2ceecadd495b41ebca1f2691d4dce8ccd1504db3c3cf58889df8eb799bda19d481803b727d55867512614f4733116dda77a22d26fc

  • SSDEEP

    12288:mEwl9Z7a0GM4Rb9So1JELBYaKMwzyrdowvUI69boqatgOr/2MlxSTtXVHM3IN:wawLNOwd69+tgyuMloTpDN

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      PO17971.exe

    • Size

      669KB

    • MD5

      7a01ce7b443e4c2f5344ef3ec0e21538

    • SHA1

      90f517920d408f9db6cdbeb6f67ba7c62708c851

    • SHA256

      ee6993e7afbf9a039db981542c0250e22fcaa01434db911732851c9e52bb38b6

    • SHA512

      9d14f5fd61cad5696b70bb2ceecadd495b41ebca1f2691d4dce8ccd1504db3c3cf58889df8eb799bda19d481803b727d55867512614f4733116dda77a22d26fc

    • SSDEEP

      12288:mEwl9Z7a0GM4Rb9So1JELBYaKMwzyrdowvUI69boqatgOr/2MlxSTtXVHM3IN:wawLNOwd69+tgyuMloTpDN

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks