General
-
Target
15022025_0635_13022025_RFQ-02132025-MOKAPTO.r01
-
Size
745KB
-
Sample
250215-hcmx6awpbw
-
MD5
c15718c99bdecf4a794003270ac7c74e
-
SHA1
78d76f97c2b52c2e6a83d35f8eefed5646701597
-
SHA256
8ae43d2f98d62de674c96686f1e9af646c655c396f25e6892418188e5ec1cf60
-
SHA512
493a7caf3e7e9a18f6956f3dc93e95b8589b32c8fd2995255baab0234503fc1a28cf3bcebab53f05e4dd29759f0b0300731d5e7f7252ee3aab9ce59697779799
-
SSDEEP
12288:zJuHaSqttENb3S/+A4rRkGp9joJHjXI6q8kD3y7hy4yzwt3ouwZPs8tOZPUgoL9h:zA6SzNrSP+kKoVLI6hSC7hRqS3o7ZxCm
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-02132025-MOKAPTO.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ-02132025-MOKAPTO.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
vipkeylogger
Targets
-
-
Target
RFQ-02132025-MOKAPTO.exe
-
Size
830KB
-
MD5
9e13697eae3048c4ab72be7c0e7b77b0
-
SHA1
b150cc216e9448a98cdce8a1456ca32f7c2ebc45
-
SHA256
0e4f406b4933acb71c6ac24fb5f15c68ec19b640a41aeb475860c63299f848a5
-
SHA512
9a9f44fa648d70519e7e62e7c6c682e5a13ce7004e0e9a8d306e39cd965d7308a730025196a8c55c5b4f948c7e6ca908d4cc89f72b1a9a64f4663a7e7c91252d
-
SSDEEP
12288:WbdHH/DneK/uGS7/9hfSer8/lSXU4jYaA0EQpOh+KbJa79vHjnQKx7/Xtfgyuupn:WbhHze2mFFr8zq1fpOh+KbJaRDnZlGK
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2