General

  • Target

    ff040c7bf107a9f1287d37bf802069204275ae3e00df7ea4ac0afc8ac41a7af2.exe

  • Size

    755KB

  • Sample

    250218-ec72jsxjfq

  • MD5

    8dcbbeef72e8d15b2395aa23d16a65df

  • SHA1

    161633236c4af012f13649823991f855d98c2812

  • SHA256

    ff040c7bf107a9f1287d37bf802069204275ae3e00df7ea4ac0afc8ac41a7af2

  • SHA512

    09be92945689c50b366a84d7aac90fadcc0725ed85b11e806b3f404682820d115c63cae6deb2ff6029f579fbe6be3f9c8444617d1baf05468482dadf50b9b386

  • SSDEEP

    12288:RxgmMOzEkJ4Yo8qdSRZ85rKo6GlljX7ybla0So6WE0hrXInl:n7zJ4d8qkwWycblIWJhral

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      ff040c7bf107a9f1287d37bf802069204275ae3e00df7ea4ac0afc8ac41a7af2.exe

    • Size

      755KB

    • MD5

      8dcbbeef72e8d15b2395aa23d16a65df

    • SHA1

      161633236c4af012f13649823991f855d98c2812

    • SHA256

      ff040c7bf107a9f1287d37bf802069204275ae3e00df7ea4ac0afc8ac41a7af2

    • SHA512

      09be92945689c50b366a84d7aac90fadcc0725ed85b11e806b3f404682820d115c63cae6deb2ff6029f579fbe6be3f9c8444617d1baf05468482dadf50b9b386

    • SSDEEP

      12288:RxgmMOzEkJ4Yo8qdSRZ85rKo6GlljX7ybla0So6WE0hrXInl:n7zJ4d8qkwWycblIWJhral

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks