General

  • Target

    15022025_0635_13022025_RFQ-02132025-MOKAPTO.r01

  • Size

    745KB

  • Sample

    250215-hcmx6awpbw

  • MD5

    c15718c99bdecf4a794003270ac7c74e

  • SHA1

    78d76f97c2b52c2e6a83d35f8eefed5646701597

  • SHA256

    8ae43d2f98d62de674c96686f1e9af646c655c396f25e6892418188e5ec1cf60

  • SHA512

    493a7caf3e7e9a18f6956f3dc93e95b8589b32c8fd2995255baab0234503fc1a28cf3bcebab53f05e4dd29759f0b0300731d5e7f7252ee3aab9ce59697779799

  • SSDEEP

    12288:zJuHaSqttENb3S/+A4rRkGp9joJHjXI6q8kD3y7hy4yzwt3ouwZPs8tOZPUgoL9h:zA6SzNrSP+kKoVLI6hSC7hRqS3o7ZxCm

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      RFQ-02132025-MOKAPTO.exe

    • Size

      830KB

    • MD5

      9e13697eae3048c4ab72be7c0e7b77b0

    • SHA1

      b150cc216e9448a98cdce8a1456ca32f7c2ebc45

    • SHA256

      0e4f406b4933acb71c6ac24fb5f15c68ec19b640a41aeb475860c63299f848a5

    • SHA512

      9a9f44fa648d70519e7e62e7c6c682e5a13ce7004e0e9a8d306e39cd965d7308a730025196a8c55c5b4f948c7e6ca908d4cc89f72b1a9a64f4663a7e7c91252d

    • SSDEEP

      12288:WbdHH/DneK/uGS7/9hfSer8/lSXU4jYaA0EQpOh+KbJa79vHjnQKx7/Xtfgyuupn:WbhHze2mFFr8zq1fpOh+KbJaRDnZlGK

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks