General

  • Target

    f5cb7bec4d09db4a228e21ccf2bd3fc3ca30ad8d4fca467bd8ed3fc89a1e5bd4N.exe

  • Size

    760KB

  • Sample

    250225-dszjns1js2

  • MD5

    80a3a7ef0dc24fc7c3a0549e7286f820

  • SHA1

    c22be101cb8ed3afb9be1274067e8d62f0e258d8

  • SHA256

    f5cb7bec4d09db4a228e21ccf2bd3fc3ca30ad8d4fca467bd8ed3fc89a1e5bd4

  • SHA512

    2e9e42f386ff3637e8ea02d52a6bcfa2ee5a383442c0f93522cc4e9e2d7a4acff55bc30976601be27f29910055f1db5a088c83f15afa4def7a0a982885da7e01

  • SSDEEP

    12288:xxgmf6rlmlYd+QLZb3T7me61C7ulT0H2eYx+4v2w5wKJSTcuVu02G:H6mWd+SZj7me61C7aT9eYw4vx5Oca2

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      f5cb7bec4d09db4a228e21ccf2bd3fc3ca30ad8d4fca467bd8ed3fc89a1e5bd4N.exe

    • Size

      760KB

    • MD5

      80a3a7ef0dc24fc7c3a0549e7286f820

    • SHA1

      c22be101cb8ed3afb9be1274067e8d62f0e258d8

    • SHA256

      f5cb7bec4d09db4a228e21ccf2bd3fc3ca30ad8d4fca467bd8ed3fc89a1e5bd4

    • SHA512

      2e9e42f386ff3637e8ea02d52a6bcfa2ee5a383442c0f93522cc4e9e2d7a4acff55bc30976601be27f29910055f1db5a088c83f15afa4def7a0a982885da7e01

    • SSDEEP

      12288:xxgmf6rlmlYd+QLZb3T7me61C7ulT0H2eYx+4v2w5wKJSTcuVu02G:H6mWd+SZj7me61C7aT9eYw4vx5Oca2

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks