General

  • Target

    Keronal Trading Company - RFQ.dot

  • Size

    628KB

  • Sample

    250128-nt92xazrbr

  • MD5

    e3b822812c80a835f4af46cf6e719c62

  • SHA1

    e95830869ed3154e59694a4366576d09946bfc73

  • SHA256

    5a9679af2c72888b1632221bc1330b86d7fb779de11b51b062a1e1cb43343a75

  • SHA512

    55881b9f252979c2f370d65852b9688aa3b82d3b0376405ed82fbc82d981450a72e48765d0e65d2f2e20de955101976305936bd24e81ba919716d687c9fa4af1

  • SSDEEP

    6144:UwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAX:nRY

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Keronal Trading Company - RFQ.dot

    • Size

      628KB

    • MD5

      e3b822812c80a835f4af46cf6e719c62

    • SHA1

      e95830869ed3154e59694a4366576d09946bfc73

    • SHA256

      5a9679af2c72888b1632221bc1330b86d7fb779de11b51b062a1e1cb43343a75

    • SHA512

      55881b9f252979c2f370d65852b9688aa3b82d3b0376405ed82fbc82d981450a72e48765d0e65d2f2e20de955101976305936bd24e81ba919716d687c9fa4af1

    • SSDEEP

      6144:UwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAX:nRY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks