General

  • Target

    6208e1d4a0b694b7d2a70d312f8472b2c2acd0edacbd5a2344199672d7dd84af.exe

  • Size

    778KB

  • Sample

    250124-fdzx1a1qhn

  • MD5

    81332f0e4a7a3a05f1d7913bd6abde29

  • SHA1

    f78bea92cf162027646f00d36961df9df522af04

  • SHA256

    6208e1d4a0b694b7d2a70d312f8472b2c2acd0edacbd5a2344199672d7dd84af

  • SHA512

    0bb9fc1dad65d20c6dad59af9c8f065ad0af69a71799f3573802b43b6a1258dc80aaa5e835b5daae690089e2231f1ae18f7058215ffd2f505dd722c41ee177d0

  • SSDEEP

    12288:PFFtuaAcBxIDU1SOin39rmxd29Qhkkzd/KikEXD/8ZH1LD31TvkFkllR9jtOI1m7:P1uaAiejQ4Qhp1KkD/8TNA6lFjgI1hu

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      6208e1d4a0b694b7d2a70d312f8472b2c2acd0edacbd5a2344199672d7dd84af.exe

    • Size

      778KB

    • MD5

      81332f0e4a7a3a05f1d7913bd6abde29

    • SHA1

      f78bea92cf162027646f00d36961df9df522af04

    • SHA256

      6208e1d4a0b694b7d2a70d312f8472b2c2acd0edacbd5a2344199672d7dd84af

    • SHA512

      0bb9fc1dad65d20c6dad59af9c8f065ad0af69a71799f3573802b43b6a1258dc80aaa5e835b5daae690089e2231f1ae18f7058215ffd2f505dd722c41ee177d0

    • SSDEEP

      12288:PFFtuaAcBxIDU1SOin39rmxd29Qhkkzd/KikEXD/8ZH1LD31TvkFkllR9jtOI1m7:P1uaAiejQ4Qhp1KkD/8TNA6lFjgI1hu

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks