General
-
Target
Gruss.exe
-
Size
747KB
-
Sample
250213-rtht7szkgv
-
MD5
be12d58b91d733a5485688b63aaa4b32
-
SHA1
ddd0a6456ef8fdb505d2e8c5cbe6321742459298
-
SHA256
de86179c7ad9444d2f649c0158dfb72a8203af1e716f706e3fb0955e36bedf8d
-
SHA512
5b5e2f04e6cf3dc27ea5451ef7416304451db73cb88902358282d72bf6697491e494d7c652fde297ee948f04ebbf8538385b61286a108cc1c24f07012b9aab87
-
SSDEEP
12288:0F9YSXf0yM0l9r1Yk2y38SeD83S1qIFRDRxnE8UML789zUO9vVOI0emBmL:kJXlB9rqY3lRsdrxnlGUOdb0emBmL
Static task
static1
Behavioral task
behavioral1
Sample
Gruss.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Gruss.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
vipkeylogger
Targets
-
-
Target
Gruss.exe
-
Size
747KB
-
MD5
be12d58b91d733a5485688b63aaa4b32
-
SHA1
ddd0a6456ef8fdb505d2e8c5cbe6321742459298
-
SHA256
de86179c7ad9444d2f649c0158dfb72a8203af1e716f706e3fb0955e36bedf8d
-
SHA512
5b5e2f04e6cf3dc27ea5451ef7416304451db73cb88902358282d72bf6697491e494d7c652fde297ee948f04ebbf8538385b61286a108cc1c24f07012b9aab87
-
SSDEEP
12288:0F9YSXf0yM0l9r1Yk2y38SeD83S1qIFRDRxnE8UML789zUO9vVOI0emBmL:kJXlB9rqY3lRsdrxnlGUOdb0emBmL
-
Guloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2