General

  • Target

    dc9b1005fe4366eacbafdad4a8c7da5c899af7c738fb869f9ad4779625a00efd.exe

  • Size

    772KB

  • Sample

    250215-fe17fsvmdj

  • MD5

    c8108dbd5c04f93464e16278e3144fb5

  • SHA1

    7681b496e4b2198293131e21fb723c0e6756d666

  • SHA256

    dc9b1005fe4366eacbafdad4a8c7da5c899af7c738fb869f9ad4779625a00efd

  • SHA512

    b0d4d8fc312d51f95b23045f3a732f8fa7ea8e8a8d8e3fcef547dd50bca6281d44b7f9316901cbf7fbc9491f340dfec1dd84869788c133a6bd6bce8fedb732c5

  • SSDEEP

    12288:sIHH/DneK/3aPHViC+Ixel8rPk0aVkDDxR+iECO25rSkEgBhqdfrdcmfxKvSrNQ:siHze19aI4es01Bs6FrSkEehQrXfi

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      dc9b1005fe4366eacbafdad4a8c7da5c899af7c738fb869f9ad4779625a00efd.exe

    • Size

      772KB

    • MD5

      c8108dbd5c04f93464e16278e3144fb5

    • SHA1

      7681b496e4b2198293131e21fb723c0e6756d666

    • SHA256

      dc9b1005fe4366eacbafdad4a8c7da5c899af7c738fb869f9ad4779625a00efd

    • SHA512

      b0d4d8fc312d51f95b23045f3a732f8fa7ea8e8a8d8e3fcef547dd50bca6281d44b7f9316901cbf7fbc9491f340dfec1dd84869788c133a6bd6bce8fedb732c5

    • SSDEEP

      12288:sIHH/DneK/3aPHViC+Ixel8rPk0aVkDDxR+iECO25rSkEgBhqdfrdcmfxKvSrNQ:siHze19aI4es01Bs6FrSkEehQrXfi

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Downloads MZ/PE file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks