General

  • Target

    3c7370f4f0920026c86ed605bf52d85c3f3b36060af7463f3d9a7a0ad7edbd8b.exe

  • Size

    765KB

  • Sample

    250225-csph2awpv3

  • MD5

    6906fe686f004ec916e00791a2b2fd14

  • SHA1

    56ef5f57e9f1872952db2584fb2b4b68594e3f33

  • SHA256

    3c7370f4f0920026c86ed605bf52d85c3f3b36060af7463f3d9a7a0ad7edbd8b

  • SHA512

    a3c96431378d4de62c833a02d4f34a60cf19dd31ef820eba4aa7b9616815ae64de15fa3a2c9014e4bdecc3e4ca119f392aa01517354ecc7cf8c8dcf7b56cd77a

  • SSDEEP

    12288:mMr8I9idYeXY/e1Ggg0MivjmYMmgEf4+oXTbTguKcYQV3e0Ds4LfrD4L4idho4lv:mMrbURwgghMg+GTguKBY3Ho4fDothgLi

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      3c7370f4f0920026c86ed605bf52d85c3f3b36060af7463f3d9a7a0ad7edbd8b.exe

    • Size

      765KB

    • MD5

      6906fe686f004ec916e00791a2b2fd14

    • SHA1

      56ef5f57e9f1872952db2584fb2b4b68594e3f33

    • SHA256

      3c7370f4f0920026c86ed605bf52d85c3f3b36060af7463f3d9a7a0ad7edbd8b

    • SHA512

      a3c96431378d4de62c833a02d4f34a60cf19dd31ef820eba4aa7b9616815ae64de15fa3a2c9014e4bdecc3e4ca119f392aa01517354ecc7cf8c8dcf7b56cd77a

    • SSDEEP

      12288:mMr8I9idYeXY/e1Ggg0MivjmYMmgEf4+oXTbTguKcYQV3e0Ds4LfrD4L4idho4lv:mMrbURwgghMg+GTguKBY3Ho4fDothgLi

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks