General

  • Target

    d80a034f75ad1ffbbc3117c2fc70c6b46678d068b0f73cdafb813d60cb4c7466

  • Size

    743KB

  • Sample

    250225-jn7blsyjy7

  • MD5

    8088bfb26045a64ebf7447ce1011b7e6

  • SHA1

    7b6ac5469a688cbe473d418970ab239643848700

  • SHA256

    d80a034f75ad1ffbbc3117c2fc70c6b46678d068b0f73cdafb813d60cb4c7466

  • SHA512

    8b9c00cbcf2c96d53bd5b6dac2b980398be848cd041ba530ba4be3e4e5f8958e6015d4401067749dc71759f558244cd2f2034afa996511eab5084a20f2ec72d5

  • SSDEEP

    12288:hhWoOamSCXR4aF0o8fyOo3Y8v+c+0pLE4LkUo1OZz3LXZSAdRRsVDdslh+N7d4lB:9VfyOIYq+r8fqYZfZSyAslANJq/BRt

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Attach invoice 90263DL.exe

    • Size

      889KB

    • MD5

      37eaddd42f6a48b48b9b3034ce1f110b

    • SHA1

      923a0d8a4bc8e16e45346325895e8f8e3e3e6fbe

    • SHA256

      af8e3a881c404bab033ecfb5163924dd6f77a7f45b3e18c26cb172058cb935f2

    • SHA512

      40db735ea44835262848023988f6ec7ee9b4376cf83b07e5f4718bb75a32605fa37d8cde664f74cbeb91fabe4b3d334752ef018d987b3e99f706616107ee14ff

    • SSDEEP

      24576:nb8GeHc7aywIASaNItcYjLLSkAsZ64y7:nQGeHsLwI8G+Y+kAsZJA

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks