General

  • Target

    SecuriteInfo.com.Variant.Genie.8DN.204.7362.6076.exe

  • Size

    772KB

  • Sample

    250226-c381essqt5

  • MD5

    9aaf4b0863e537b512e19ce28bcd3103

  • SHA1

    87a25d404b668bfaffef341202a636679bb709a4

  • SHA256

    48f1f3d8b15ea4297df16072fea427a8fadd695c47ea27c16d933a99deb4f2f3

  • SHA512

    b1d4c73c55fb2a97cc337bd56e949e6f0d79030e88d14670473a54c7a764f154ed563092013316e9a2e5dc1d1d69220e1c9953aeed1d19a71e94bcd2bc7a0c2d

  • SSDEEP

    12288:Wu383le9ciS+zfTKCEK+A1ottwO+Fxau1I8REY8KD11Q3bj75+ALmtDsTNnqkR:WY3A6bfTnCnF+Fx/1rUCLQ3P1+8mgnp

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      SecuriteInfo.com.Variant.Genie.8DN.204.7362.6076.exe

    • Size

      772KB

    • MD5

      9aaf4b0863e537b512e19ce28bcd3103

    • SHA1

      87a25d404b668bfaffef341202a636679bb709a4

    • SHA256

      48f1f3d8b15ea4297df16072fea427a8fadd695c47ea27c16d933a99deb4f2f3

    • SHA512

      b1d4c73c55fb2a97cc337bd56e949e6f0d79030e88d14670473a54c7a764f154ed563092013316e9a2e5dc1d1d69220e1c9953aeed1d19a71e94bcd2bc7a0c2d

    • SSDEEP

      12288:Wu383le9ciS+zfTKCEK+A1ottwO+Fxau1I8REY8KD11Q3bj75+ALmtDsTNnqkR:WY3A6bfTnCnF+Fx/1rUCLQ3P1+8mgnp

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks