General
-
Target
ac75ac31022ef9a5321447d711c6044c4e123e418eed58120ba1c4c1c98032d1
-
Size
676KB
-
Sample
250217-hgzshstpfv
-
MD5
07926325957e86b1ce8ad1e7f549e5e7
-
SHA1
3651017c77b5a113e911a62202e9ac0b20042eee
-
SHA256
ac75ac31022ef9a5321447d711c6044c4e123e418eed58120ba1c4c1c98032d1
-
SHA512
3a556e2fe084d02cd7d767606b051dd9e01ebd52e0717a3fcc40ce33e0f9153936d687b465552e873392176471c4a19f9bafe438cd32df4cf88c12097c46174e
-
SSDEEP
12288:0QNC07sg60unz7UzLstU9OQdfI7HnZRYYu07EiCux+SsViX1G5oCG1:0WC6sgTmz7EYG9LdfY8Yu07bxHXQ5oCe
Static task
static1
Behavioral task
behavioral1
Sample
533391538-AO.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
533391538-AO.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
hosting2.ro.hostsailor.com - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Targets
-
-
Target
533391538-AO.exe
-
Size
761KB
-
MD5
b3b270e1427d8514c677ababc71d470d
-
SHA1
ca508fe9bdb4ffe8e36acb85d4b9b95922a04eea
-
SHA256
9cd74900f862dafb7fbed8b6e9c1efb8b4258b5932c847d37475653004ebbf51
-
SHA512
39065f094b872dd88cd37c69840042989c88f2add184d5f68c84114cde6d6f7df9445d8c029e8c23fad44ceb434f4f155c4075be61ae2ea8bf1eac63e2db352e
-
SSDEEP
12288:Oxgmt600zF7UzfwtshCQfefIVZbYYq0rEi4ux6c4VnbnPvFqjMiN6:K/TqF7EY6hnWfGOYq0rFxgnPdqzN
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2