General

  • Target

    20786121768.zip

  • Size

    305KB

  • Sample

    250117-rqk56a1nf1

  • MD5

    3d36b0d7d3f10e868c3757b584a6b25d

  • SHA1

    6a49157bc2926ee59b5ca26109b7866a953b7355

  • SHA256

    4cf9e78577432a9522a9cbf40bdace60d479052c48b8ff4e1800de074bf26aaa

  • SHA512

    50d709d0753145787bb63e970aee7756b3669b20bb7609bb1dd70f83a9b3f3b9addbd28d433d7f5180961ac496cf5466d485d35d9a72e821605bfbf2c2c913e9

  • SSDEEP

    6144:HXHyiXaHMsWP4SxpR+UEAfg4pVLesv+UECdSEQe7Qe9bjmLY+3DcjjfC:H3yiXaHMFgSrSv4PesR5j7lWTDc3K

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      49b4309c8ed22ee8489f94f5fa9723c019e8d62b84fb284156f7211fe515fe87

    • Size

      337KB

    • MD5

      60274794f3fb71d2d5ba5e79040e848a

    • SHA1

      540d7a3a0923aa576185561d931616b10a069074

    • SHA256

      49b4309c8ed22ee8489f94f5fa9723c019e8d62b84fb284156f7211fe515fe87

    • SHA512

      1c7e29c213ca2b9e8237f0c0f214ae1ffb334d418c36b659fbe7ebe44c30fe1f4748c77407914ddb1cc3a830a7abedd1fc680e3d969199bfe1304ef3c482c39b

    • SSDEEP

      6144:mgyJN9fUXZ858P8GkWF6JVUs4yVrgBaoZdjW/CVzT8yrJLnIgEO:YJN9I2EZku6Jms4yEdjWqVzPrJLIgEO

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks