General

  • Target

    07ecf938cb842fe35f0ac8cdab40e104411e7763d80da2a1a199a50d03349ea1.z

  • Size

    683KB

  • Sample

    250129-chzw1sxmgv

  • MD5

    9554608e35975ed4875fa05461b4775c

  • SHA1

    7a7567737768864cc759a6b6735669590067be7d

  • SHA256

    07ecf938cb842fe35f0ac8cdab40e104411e7763d80da2a1a199a50d03349ea1

  • SHA512

    a0e1c3d2b698e12762887f740da0cec0efa45e18b2677e2b92028f3d95b095fa57802a9b1fa8837f47487ff498dd8c3b5c726eb2e69d31d544dd65b9fc74dfa2

  • SSDEEP

    12288:waRjGAgfTsRhBPrg5B4VSK1TAjN5FR1Xeqbj3fQbo9AepE3ZfH:tj5BzBDgoVN1MntPvONe+3F

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Mechanical Tendering Engineer – Infrastructure.exe

    • Size

      821KB

    • MD5

      429c7a3322bd34eafacec92baba5ec09

    • SHA1

      61bbaec2ed91d5885cb2ee21e23b781ac91824d9

    • SHA256

      071d0a5405c4bc0d3319aa4756ad6afb703c8462d1a6d616765eeae22dcdbd30

    • SHA512

      8181ee44d934d6303f4ad2414741d4b422cdc2b038332ed13330bc6c8b3eb75d57dd1905a976a24ba40a78a2634c11539338db141ada5e4e810c2bef464c4d33

    • SSDEEP

      12288:qKY00jgMZ9+x/KDUBfssWfQoIGEcFC/oqE1TqIKqmuUN93ANpe0:qKdjMZ9+x/pBEDfycFC/A1tZmV3el

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks