General

  • Target

    3fc9afa49fa31f495a7792c38b6087609438625ec5073383483d7d1411c7cec8.exe

  • Size

    634KB

  • Sample

    250111-dhzfxstkbq

  • MD5

    80a64f0b8df55d637e135f0eb4fb6b70

  • SHA1

    f491fc184d0f15d789e81577e47446478c10ed53

  • SHA256

    3fc9afa49fa31f495a7792c38b6087609438625ec5073383483d7d1411c7cec8

  • SHA512

    f2604fc98d1ed6959b4a42ef442cac15919ebb1b26f7516fa0ca782c639d035c7f5c0f599511e87246338a959be4e5104ff98e3df4bb7ab78b50389784e83432

  • SSDEEP

    12288:ZOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiaqooGCQemOT6I0FGk9x:Zq5TfcdHj4fmbGG53OF0Nx

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      3fc9afa49fa31f495a7792c38b6087609438625ec5073383483d7d1411c7cec8.exe

    • Size

      634KB

    • MD5

      80a64f0b8df55d637e135f0eb4fb6b70

    • SHA1

      f491fc184d0f15d789e81577e47446478c10ed53

    • SHA256

      3fc9afa49fa31f495a7792c38b6087609438625ec5073383483d7d1411c7cec8

    • SHA512

      f2604fc98d1ed6959b4a42ef442cac15919ebb1b26f7516fa0ca782c639d035c7f5c0f599511e87246338a959be4e5104ff98e3df4bb7ab78b50389784e83432

    • SSDEEP

      12288:ZOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiaqooGCQemOT6I0FGk9x:Zq5TfcdHj4fmbGG53OF0Nx

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks