General

  • Target

    Gruss.exe

  • Size

    747KB

  • Sample

    250214-hks45swphx

  • MD5

    be12d58b91d733a5485688b63aaa4b32

  • SHA1

    ddd0a6456ef8fdb505d2e8c5cbe6321742459298

  • SHA256

    de86179c7ad9444d2f649c0158dfb72a8203af1e716f706e3fb0955e36bedf8d

  • SHA512

    5b5e2f04e6cf3dc27ea5451ef7416304451db73cb88902358282d72bf6697491e494d7c652fde297ee948f04ebbf8538385b61286a108cc1c24f07012b9aab87

  • SSDEEP

    12288:0F9YSXf0yM0l9r1Yk2y38SeD83S1qIFRDRxnE8UML789zUO9vVOI0emBmL:kJXlB9rqY3lRsdrxnlGUOdb0emBmL

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      Gruss.exe

    • Size

      747KB

    • MD5

      be12d58b91d733a5485688b63aaa4b32

    • SHA1

      ddd0a6456ef8fdb505d2e8c5cbe6321742459298

    • SHA256

      de86179c7ad9444d2f649c0158dfb72a8203af1e716f706e3fb0955e36bedf8d

    • SHA512

      5b5e2f04e6cf3dc27ea5451ef7416304451db73cb88902358282d72bf6697491e494d7c652fde297ee948f04ebbf8538385b61286a108cc1c24f07012b9aab87

    • SSDEEP

      12288:0F9YSXf0yM0l9r1Yk2y38SeD83S1qIFRDRxnE8UML789zUO9vVOI0emBmL:kJXlB9rqY3lRsdrxnlGUOdb0emBmL

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      cf85183b87314359488b850f9e97a698

    • SHA1

      6b6c790037eec7ebea4d05590359cb4473f19aea

    • SHA256

      3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac

    • SHA512

      fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b

    • SSDEEP

      96:3IsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9oug:YVL7ikJb76BQUoUm+RnyXVYO2RvHoug

    Score
    8/10
    • Downloads MZ/PE file

MITRE ATT&CK Enterprise v15

Tasks