General
-
Target
9a71da6c174ed01e2bb5fddd7bc7d2ff7e6a988b8deecd05c6935373192573ab.exe
-
Size
740KB
-
Sample
250130-dxr1dsxlf1
-
MD5
2a54e265ef5e69728c0d204fb3d7e60a
-
SHA1
909e441fbb166582b62579e948492292365530fc
-
SHA256
9a71da6c174ed01e2bb5fddd7bc7d2ff7e6a988b8deecd05c6935373192573ab
-
SHA512
fd9692f0eda673c99181acd4c5dad6e133235d8abfb8a79aa6290ce62465c2acc335377b8b4863a3db4ee3f6259fc64a19015a7d5099ca704cb342cbb2935b44
-
SSDEEP
12288:7IjCsB2LjKzgcD8NxU4GubAa5HSLKOugn229fdUOjAL:wB2LGUcD8ZnCu22GDi
Static task
static1
Behavioral task
behavioral1
Sample
9a71da6c174ed01e2bb5fddd7bc7d2ff7e6a988b8deecd05c6935373192573ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9a71da6c174ed01e2bb5fddd7bc7d2ff7e6a988b8deecd05c6935373192573ab.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
vipkeylogger
Targets
-
-
Target
9a71da6c174ed01e2bb5fddd7bc7d2ff7e6a988b8deecd05c6935373192573ab.exe
-
Size
740KB
-
MD5
2a54e265ef5e69728c0d204fb3d7e60a
-
SHA1
909e441fbb166582b62579e948492292365530fc
-
SHA256
9a71da6c174ed01e2bb5fddd7bc7d2ff7e6a988b8deecd05c6935373192573ab
-
SHA512
fd9692f0eda673c99181acd4c5dad6e133235d8abfb8a79aa6290ce62465c2acc335377b8b4863a3db4ee3f6259fc64a19015a7d5099ca704cb342cbb2935b44
-
SSDEEP
12288:7IjCsB2LjKzgcD8NxU4GubAa5HSLKOugn229fdUOjAL:wB2LGUcD8ZnCu22GDi
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2