General

  • Target

    06ffd5cfe0c7895062e69385f6393c13022499342f4c80582561913583f850a0.dot

  • Size

    628KB

  • Sample

    250130-dcqa3avqcq

  • MD5

    a51f9396d4804b48af9e79902e32580f

  • SHA1

    1f9f9209145556c22bfa74f8a3654aceb81b8ad9

  • SHA256

    06ffd5cfe0c7895062e69385f6393c13022499342f4c80582561913583f850a0

  • SHA512

    7016a546d4a3a1804a3d6e54887d0eee311b87f14e7b7d466d91c4785e877859c3d8d32b2324bc690b117f19319243bf1ea4946885ee6768dca78584effe8c75

  • SSDEEP

    6144:UwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAl:nRQ

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      06ffd5cfe0c7895062e69385f6393c13022499342f4c80582561913583f850a0.dot

    • Size

      628KB

    • MD5

      a51f9396d4804b48af9e79902e32580f

    • SHA1

      1f9f9209145556c22bfa74f8a3654aceb81b8ad9

    • SHA256

      06ffd5cfe0c7895062e69385f6393c13022499342f4c80582561913583f850a0

    • SHA512

      7016a546d4a3a1804a3d6e54887d0eee311b87f14e7b7d466d91c4785e877859c3d8d32b2324bc690b117f19319243bf1ea4946885ee6768dca78584effe8c75

    • SSDEEP

      6144:UwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAl:nRQ

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks