General

  • Target

    a02e01069a411ac5f354cc5cd4ed2230baf3d25658859dfee5c6cb897c0e090d

  • Size

    735KB

  • Sample

    250213-qy1p5sykfj

  • MD5

    d3528ed45fe5c1b447fc143ac5705208

  • SHA1

    aa0669d96bd84c2e03a159f82c34c660073cd8dd

  • SHA256

    a02e01069a411ac5f354cc5cd4ed2230baf3d25658859dfee5c6cb897c0e090d

  • SHA512

    6f7a7f01dbddb4b8681e6af7588103855f9ffc48225ca0674bad4bbc45be1b9c00c735c526f3cc4180cff6c4164fc06781deb71bdd7335f9fd46c9d23ca5a604

  • SSDEEP

    12288:jFaJP41CL5fO+qjjo91+Mvs6jKLAFY6oc6gDC+TozhjHk4LBtinFSIWprYi2pBA:pTAL5WlUzHvFFTDvC+QhXLziF5WprY0

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      Aksecylinder.exe

    • Size

      750KB

    • MD5

      e829e0f6d465052b5d6f2a6859d3758d

    • SHA1

      6dfc7933c035bd6f6b3d7a39e9a266c5be535bd1

    • SHA256

      160856540bd88b9662d5f8f82d220bb167072c2f89cc51e5ef769cc524d86647

    • SHA512

      fa4fc21a12532f7a0b64a9e77a8a2676144cbefcb33b4c26e2deddbfead5a00fe708b846e3273cec38dfb9bb0a4d357828701a68b0de919b7c4c41505db14c93

    • SSDEEP

      12288:uF99nDxQgv8fbbwQarRSOy38SeD83S1B0E3EqDxnE8UML789zUO9vVOI0emBm:qdxjK3wQagL3lRsLxnlGUOdb0emBm

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      cf85183b87314359488b850f9e97a698

    • SHA1

      6b6c790037eec7ebea4d05590359cb4473f19aea

    • SHA256

      3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac

    • SHA512

      fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b

    • SSDEEP

      96:3IsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9oug:YVL7ikJb76BQUoUm+RnyXVYO2RvHoug

    Score
    8/10
    • Downloads MZ/PE file

MITRE ATT&CK Enterprise v15

Tasks