General

  • Target

    fbedef51ab56bbadb39b992bc7290e0c1c2d48998fa3d1f825463c648f730d38

  • Size

    706KB

  • Sample

    250128-c9qsesvkdy

  • MD5

    d9e81f611261349826a93d49de8a507c

  • SHA1

    b8445513c4ea49adf39fbb7cfc32b5ea5ea6e0c4

  • SHA256

    fbedef51ab56bbadb39b992bc7290e0c1c2d48998fa3d1f825463c648f730d38

  • SHA512

    58f5a20987288f7d196426b094c8c38731cd39f1eb827ecddcad0a117ec545e7592e9d88e851d4260e2fdd0a1455147d4a99fe404c47a9e99949bc782cb1af95

  • SSDEEP

    12288:CF6OhDRdG4jMOqrtXHhIp5F9nRhNChZ8wJQhDxQ4mXIrBBu1rFjlD25w0D027yzT:Jitv0tS/nRhEcwJg5cIAD25fQ278Y34J

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      AWB NO 176-7816 7670.exe

    • Size

      823KB

    • MD5

      d7aad55451ce1bfe016227182e08eb3b

    • SHA1

      5d4b23b9511289538097198ab9b3293a54bdcf12

    • SHA256

      98cded77401bd3947b29437a62a313f90cc613e76261451081898ff1a7e3a841

    • SHA512

      19ea1c0339b5377ea3180859cfe3d5fadb6effc2e964e1b13c6060daa7371337b7436373e50766afb8b7e717896141f8fa6a201a3d09a421fc4b7c204968e5b6

    • SSDEEP

      12288:q/Y00jzAltXHhI55L9gQxXRNMnjpcwrQrDxc4mVIpB1uFrFttnj5Cic5pYf0:q/dTRSNgQRRCnVcwrQRQIansic5pl

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks