General

  • Target

    SignedInvoice.exe

  • Size

    766KB

  • Sample

    250224-lfdqfavky9

  • MD5

    35a8b284b170cd75cd1d7db7fabd7dfd

  • SHA1

    fb016ba3030e9aff80022c08a9674ba99a1efffd

  • SHA256

    a5ec9721b976b5b2b9b212d0dd05313a95460c0cf685d9156e51962bcab76164

  • SHA512

    f82f59923c5e9af9d3c6f165d866b840be2daa7fd17c93f569de67d3f46af4a66ea55ef4bbc3c411a78be84d728c1d87c302769bf95eb081372ecd91aa32d246

  • SSDEEP

    12288:mMr8IX5dYeXY/e1crO8ZvULHKtSj0LkUATqs3vK7rgaDFXjMAH4s786Ztt5nvwhX:mMrbpR6JGLwSjckZTqyvKAaDF/HH7FX8

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      SignedInvoice.exe

    • Size

      766KB

    • MD5

      35a8b284b170cd75cd1d7db7fabd7dfd

    • SHA1

      fb016ba3030e9aff80022c08a9674ba99a1efffd

    • SHA256

      a5ec9721b976b5b2b9b212d0dd05313a95460c0cf685d9156e51962bcab76164

    • SHA512

      f82f59923c5e9af9d3c6f165d866b840be2daa7fd17c93f569de67d3f46af4a66ea55ef4bbc3c411a78be84d728c1d87c302769bf95eb081372ecd91aa32d246

    • SSDEEP

      12288:mMr8IX5dYeXY/e1crO8ZvULHKtSj0LkUATqs3vK7rgaDFXjMAH4s786Ztt5nvwhX:mMrbpR6JGLwSjckZTqyvKAaDF/HH7FX8

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks