General

  • Target

    6cae02b9c53e25101109e266fc3ad28aa093aca1cb1313b0a67e942d1503e106N.exe

  • Size

    935KB

  • Sample

    250224-m8ghgaypz7

  • MD5

    9a8b2f175cdbb6e8c709a39a11ba7a90

  • SHA1

    62e576084c556ad5d1d3370db2af94a367d351ba

  • SHA256

    6cae02b9c53e25101109e266fc3ad28aa093aca1cb1313b0a67e942d1503e106

  • SHA512

    66dad6f1475c673712380dfa832a7b6c005563df1645995758fa93571f93dc1fe7378237b55afc6f7363260b553fbe95e9ae8c1e40ab2b2817b823dce9e701b5

  • SSDEEP

    24576:9+AH7M28NNEDMj73JTlB2s0O8BD48rWHFDW+1RUrV:MsWNEDmJT7L0O8BD48rWHFDW+1RuV

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      6cae02b9c53e25101109e266fc3ad28aa093aca1cb1313b0a67e942d1503e106N.exe

    • Size

      935KB

    • MD5

      9a8b2f175cdbb6e8c709a39a11ba7a90

    • SHA1

      62e576084c556ad5d1d3370db2af94a367d351ba

    • SHA256

      6cae02b9c53e25101109e266fc3ad28aa093aca1cb1313b0a67e942d1503e106

    • SHA512

      66dad6f1475c673712380dfa832a7b6c005563df1645995758fa93571f93dc1fe7378237b55afc6f7363260b553fbe95e9ae8c1e40ab2b2817b823dce9e701b5

    • SSDEEP

      24576:9+AH7M28NNEDMj73JTlB2s0O8BD48rWHFDW+1RUrV:MsWNEDmJT7L0O8BD48rWHFDW+1RuV

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks