General

  • Target

    db68ee20995fd5efb622a2517a2d623f7894cfaf34827d233d864622ae54b143

  • Size

    741KB

  • Sample

    250225-jqpvcaykx3

  • MD5

    ccb1aa08ea371139d632a459a9035629

  • SHA1

    342a995d6890839bd54580ccfe60f77cc640cb19

  • SHA256

    db68ee20995fd5efb622a2517a2d623f7894cfaf34827d233d864622ae54b143

  • SHA512

    215de0d0a7570372c9dc199a4abb67e874f3d61ffe27e2a51b7a2974465fb71bebd55d7533eea8dcc6a16570bd87fdb36586947671b42e8bcdd74097d30a27c7

  • SSDEEP

    12288:DHfl1/+7EQXXfYEMCmljDEcKjDc+k9MZCcNpGwgMne0M6SzxNJcxds9L1UIklHXk:DHt1/+QUXMCQYjC9KCcNpl3S2s5oAf

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      P.I. 90263DL.exe

    • Size

      888KB

    • MD5

      43400d2ef0d0dcb58dad7c4934ccd60b

    • SHA1

      4282509fde61ba01a1b6b74c6ff3e5a139ac5502

    • SHA256

      9e073e86d0a4fe62e813b9d44075b23a82fcb7713c7b5cc9d3b05e93d870ff41

    • SHA512

      50730fa0c25ffb2996ff570ab37d975589a1fe6bc4684b017f98cafbcf41151817fc02cefc345ec358ec4a0226c1388e40dbd0f3ebf4a6cb2ab264bcf0b2004d

    • SSDEEP

      12288:adOWXx1YeSyT2+gGpuqf8EuAkJjFEYKRDYUW9MZAcvp0wgM3eIM6AzzFJqNjtwDQ:MhYePj6AckRk9KAcvpLFAcuV

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks