General

  • Target

    0c2b52146f60798b2d069e7c660be0a95a9d7a970d75ac489a1dea7e97e441d2.exe

  • Size

    764KB

  • Sample

    250125-cjw7hszmev

  • MD5

    5b21a904f28094fb2bbab54bcf40f02e

  • SHA1

    b2d71d3da930aa0402eaf4ebf058e1ca35700c0d

  • SHA256

    0c2b52146f60798b2d069e7c660be0a95a9d7a970d75ac489a1dea7e97e441d2

  • SHA512

    d6940bcd78622be3313cfd0224d3f53f3a537a4bbd7947a4ff0dce134e44bbedf4e6d96b77b0fdbdf6f482bda59b65d3f0a04d2050f30ced8b82f919a5727c3e

  • SSDEEP

    12288:duMYhu3zHhaUTvH5CopD0oIvKawP8D3DOaRvZnsl9FdndKfh0VFrtA143/r:d4u3z3TQomZDrnaFSh0/rWe/r

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      0c2b52146f60798b2d069e7c660be0a95a9d7a970d75ac489a1dea7e97e441d2.exe

    • Size

      764KB

    • MD5

      5b21a904f28094fb2bbab54bcf40f02e

    • SHA1

      b2d71d3da930aa0402eaf4ebf058e1ca35700c0d

    • SHA256

      0c2b52146f60798b2d069e7c660be0a95a9d7a970d75ac489a1dea7e97e441d2

    • SHA512

      d6940bcd78622be3313cfd0224d3f53f3a537a4bbd7947a4ff0dce134e44bbedf4e6d96b77b0fdbdf6f482bda59b65d3f0a04d2050f30ced8b82f919a5727c3e

    • SSDEEP

      12288:duMYhu3zHhaUTvH5CopD0oIvKawP8D3DOaRvZnsl9FdndKfh0VFrtA143/r:d4u3z3TQomZDrnaFSh0/rWe/r

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks