General

  • Target

    fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41.exe

  • Size

    806KB

  • Sample

    250111-gtjrdszqhk

  • MD5

    6a5b8c6057dff681139fd609ffc6b21d

  • SHA1

    b37b7a2168980b4772978a640ebf5a02f41697e6

  • SHA256

    fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41

  • SHA512

    0be9c3e2e42b53ac22237f9b2a1037ca4bb46ce908df0bdbe455eb1daf41457b6dd85f1d80aee36f47fa3c6d9cf9d3a9e8867928242edf8a93aae21aa703f989

  • SSDEEP

    12288:wTJidkhIqHdLcMMEbtx0GA72BzYCqqykD0AarMhiNAgZY8i3oXRKQCzcdYSS:wTkQIwL81IBUCqpqrsfZV+ER/c

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41.exe

    • Size

      806KB

    • MD5

      6a5b8c6057dff681139fd609ffc6b21d

    • SHA1

      b37b7a2168980b4772978a640ebf5a02f41697e6

    • SHA256

      fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41

    • SHA512

      0be9c3e2e42b53ac22237f9b2a1037ca4bb46ce908df0bdbe455eb1daf41457b6dd85f1d80aee36f47fa3c6d9cf9d3a9e8867928242edf8a93aae21aa703f989

    • SSDEEP

      12288:wTJidkhIqHdLcMMEbtx0GA72BzYCqqykD0AarMhiNAgZY8i3oXRKQCzcdYSS:wTkQIwL81IBUCqpqrsfZV+ER/c

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks