General

  • Target

    24022025_1609_24022025_Signed Invoice.7z

  • Size

    668KB

  • Sample

    250224-tlzh4a1pv4

  • MD5

    4a632f71d54763e1d6dde5b85c9b3d36

  • SHA1

    3def7f485623bd3c506e878dfed7fee6a8dc7504

  • SHA256

    c6fc6a7d93f7655a2e753f0308d5a89342928d25ca9496c8e14b5c33013cf069

  • SHA512

    6e09c918842f7b52d57a54155adb3a9820cad6527c08bb5948252db033eeae73294f71be86db8452b2fe725f2449aafcb4e651bb2014783eb2b944e73a7dc400

  • SSDEEP

    12288:R3YrykY2wfmm+0N73KMM7BNOVBcWTh4CR/m9ol4ZiFIPV4LM50h7Dfo:RorGmfXO4WDRIoKISPV/G3g

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Signed Invoice.exe

    • Size

      766KB

    • MD5

      35a8b284b170cd75cd1d7db7fabd7dfd

    • SHA1

      fb016ba3030e9aff80022c08a9674ba99a1efffd

    • SHA256

      a5ec9721b976b5b2b9b212d0dd05313a95460c0cf685d9156e51962bcab76164

    • SHA512

      f82f59923c5e9af9d3c6f165d866b840be2daa7fd17c93f569de67d3f46af4a66ea55ef4bbc3c411a78be84d728c1d87c302769bf95eb081372ecd91aa32d246

    • SSDEEP

      12288:mMr8IX5dYeXY/e1crO8ZvULHKtSj0LkUATqs3vK7rgaDFXjMAH4s786Ztt5nvwhX:mMrbpR6JGLwSjckZTqyvKAaDF/HH7FX8

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks