General

  • Target

    ac75ac31022ef9a5321447d711c6044c4e123e418eed58120ba1c4c1c98032d1

  • Size

    676KB

  • Sample

    250217-hgzshstpfv

  • MD5

    07926325957e86b1ce8ad1e7f549e5e7

  • SHA1

    3651017c77b5a113e911a62202e9ac0b20042eee

  • SHA256

    ac75ac31022ef9a5321447d711c6044c4e123e418eed58120ba1c4c1c98032d1

  • SHA512

    3a556e2fe084d02cd7d767606b051dd9e01ebd52e0717a3fcc40ce33e0f9153936d687b465552e873392176471c4a19f9bafe438cd32df4cf88c12097c46174e

  • SSDEEP

    12288:0QNC07sg60unz7UzLstU9OQdfI7HnZRYYu07EiCux+SsViX1G5oCG1:0WC6sgTmz7EYG9LdfY8Yu07bxHXQ5oCe

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      533391538-AO.exe

    • Size

      761KB

    • MD5

      b3b270e1427d8514c677ababc71d470d

    • SHA1

      ca508fe9bdb4ffe8e36acb85d4b9b95922a04eea

    • SHA256

      9cd74900f862dafb7fbed8b6e9c1efb8b4258b5932c847d37475653004ebbf51

    • SHA512

      39065f094b872dd88cd37c69840042989c88f2add184d5f68c84114cde6d6f7df9445d8c029e8c23fad44ceb434f4f155c4075be61ae2ea8bf1eac63e2db352e

    • SSDEEP

      12288:Oxgmt600zF7UzfwtshCQfefIVZbYYq0rEi4ux6c4VnbnPvFqjMiN6:K/TqF7EY6hnWfGOYq0rFxgnPdqzN

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks