General

  • Target

    Item list.pdf.001

  • Size

    659KB

  • Sample

    250128-ls3v4avngm

  • MD5

    a4f7739528d2b31d057de26da931f434

  • SHA1

    2bc0487fab4cd201b13e18f1ab4f82b19df0c9f8

  • SHA256

    2da26ed996679b7e984ae1080a1accb5205ce9957762c9f5f4d5dfbc7ba77060

  • SHA512

    7d7f01d5e37f7e83d9b9aab0b8f26b71b627469f0b7abccc6e6f11273cd7ff7e9c9dd77bcca8f4d2b6ab4aad716f62a78a8d0929b5b9eb71f5172d1a598035b5

  • SSDEEP

    12288:GcEO1IG236YHX7Gt+zolQjL1l7VjFeEb73snUZQTZ6aUsCHGP:GUe36c7s+z+QHb5tzEF6NsCHGP

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      R42pO9hQtYC159l.exe

    • Size

      743KB

    • MD5

      b3dd9590b35636f2580cfa18525669b2

    • SHA1

      4fa53976f2a330c71c40efbaa51ac391910c3b1e

    • SHA256

      77a0e4d0d77865d4261c9c73dc0da3e63a64755f605014d540c1f2b4b62c6bc0

    • SHA512

      ef651cca3d9afdfe0d091dddfcff3bfa320d4993ea4a93b6a9819a763fe1a89a41eb57570ea8f046cfe058f1a6f2bcd6981434cbf024cce190b32e03e9cef097

    • SSDEEP

      12288:Rjr0osPnfoWzylGZtMouH7SaeThSiwpCb6xj1N9tBVNgkZa3MBR8TUs9H0z:pR4QW+ALMKtThVwAqj1N6kZ34TUs9

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks