General

  • Target

    file.exe

  • Size

    779KB

  • Sample

    250120-qv8xca1pcy

  • MD5

    735ae1e69fea0d65c0ce0c98821ac563

  • SHA1

    b8e4eadc749076d8d738c20f084d33682c3def5d

  • SHA256

    effc68899a8894822054617b45d79a9b94f7b756c6ce55d0682c1c7ed7f52e60

  • SHA512

    c1c7f2505f658714f8c90fdd525e14f823226ab911d0c87217f139f266e3a42e2938c656f67934662ce45a5e0031998157785e454cd77535a2418ddb4df10d2f

  • SSDEEP

    12288:zdg0OAKsRfWCU27uleOdho73D7Y0J6QeQ5x4ceqvlfW8vhmAl12tZ9uLUxL7HNHi:m0/RfWCFalejhJXLv4clvlfWWqLB

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      file.exe

    • Size

      779KB

    • MD5

      735ae1e69fea0d65c0ce0c98821ac563

    • SHA1

      b8e4eadc749076d8d738c20f084d33682c3def5d

    • SHA256

      effc68899a8894822054617b45d79a9b94f7b756c6ce55d0682c1c7ed7f52e60

    • SHA512

      c1c7f2505f658714f8c90fdd525e14f823226ab911d0c87217f139f266e3a42e2938c656f67934662ce45a5e0031998157785e454cd77535a2418ddb4df10d2f

    • SSDEEP

      12288:zdg0OAKsRfWCU27uleOdho73D7Y0J6QeQ5x4ceqvlfW8vhmAl12tZ9uLUxL7HNHi:m0/RfWCFalejhJXLv4clvlfWWqLB

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks