General

  • Target

    fb48ed470290fa015fe877513b29a943702c68f643fba1cbbedcef8e78641d71

  • Size

    743KB

  • Sample

    250225-ltql6atj15

  • MD5

    dcfcca17090ea08fd08f3bcb0a357d68

  • SHA1

    1bea69f0232ed8bb7bcb05d6912a734ea85c6b8b

  • SHA256

    fb48ed470290fa015fe877513b29a943702c68f643fba1cbbedcef8e78641d71

  • SHA512

    8af1cb202333c69ba9e98fe066ea38d79ff6fdfc5faac63bc572ef6d83c661c7898eb7c841994847458d89fefda458f0bc86ec3959f71902db84fd15119b23c6

  • SSDEEP

    12288:lhWoOamSCXR4aF0o8fyOo3Y8v+c+0pLE4LkUo1OZz3LXZSAdRRsVDdslh+N7d4l9:pVfyOIYq+r8fqYZfZSyAslANJq/BR5

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Fabrics Store Order 186543.exe

    • Size

      889KB

    • MD5

      37eaddd42f6a48b48b9b3034ce1f110b

    • SHA1

      923a0d8a4bc8e16e45346325895e8f8e3e3e6fbe

    • SHA256

      af8e3a881c404bab033ecfb5163924dd6f77a7f45b3e18c26cb172058cb935f2

    • SHA512

      40db735ea44835262848023988f6ec7ee9b4376cf83b07e5f4718bb75a32605fa37d8cde664f74cbeb91fabe4b3d334752ef018d987b3e99f706616107ee14ff

    • SSDEEP

      24576:nb8GeHc7aywIASaNItcYjLLSkAsZ64y7:nQGeHsLwI8G+Y+kAsZJA

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks