General
-
Target
fbedef51ab56bbadb39b992bc7290e0c1c2d48998fa3d1f825463c648f730d38
-
Size
706KB
-
Sample
250128-c9qsesvkdy
-
MD5
d9e81f611261349826a93d49de8a507c
-
SHA1
b8445513c4ea49adf39fbb7cfc32b5ea5ea6e0c4
-
SHA256
fbedef51ab56bbadb39b992bc7290e0c1c2d48998fa3d1f825463c648f730d38
-
SHA512
58f5a20987288f7d196426b094c8c38731cd39f1eb827ecddcad0a117ec545e7592e9d88e851d4260e2fdd0a1455147d4a99fe404c47a9e99949bc782cb1af95
-
SSDEEP
12288:CF6OhDRdG4jMOqrtXHhIp5F9nRhNChZ8wJQhDxQ4mXIrBBu1rFjlD25w0D027yzT:Jitv0tS/nRhEcwJg5cIAD25fQ278Y34J
Static task
static1
Behavioral task
behavioral1
Sample
AWB NO 176-7816 7670.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AWB NO 176-7816 7670.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.cybertechllc.top - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@ - Email To:
[email protected]
Targets
-
-
Target
AWB NO 176-7816 7670.exe
-
Size
823KB
-
MD5
d7aad55451ce1bfe016227182e08eb3b
-
SHA1
5d4b23b9511289538097198ab9b3293a54bdcf12
-
SHA256
98cded77401bd3947b29437a62a313f90cc613e76261451081898ff1a7e3a841
-
SHA512
19ea1c0339b5377ea3180859cfe3d5fadb6effc2e964e1b13c6060daa7371337b7436373e50766afb8b7e717896141f8fa6a201a3d09a421fc4b7c204968e5b6
-
SSDEEP
12288:q/Y00jzAltXHhI55L9gQxXRNMnjpcwrQrDxc4mVIpB1uFrFttnj5Cic5pYf0:q/dTRSNgQRRCnVcwrQRQIansic5pl
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2