General

  • Target

    514173e80480aaa3efcbe3080c7489c7ba3db8c0d2817654af48528b94748f79

  • Size

    818KB

  • Sample

    250227-j2cn6a1xcw

  • MD5

    2d48ca75506f1a420ae5c8a844f5f186

  • SHA1

    ebc865c846116ba49d74ef354f63edafcfff5e72

  • SHA256

    514173e80480aaa3efcbe3080c7489c7ba3db8c0d2817654af48528b94748f79

  • SHA512

    64028155ec06853d6892f18e4b0b62754873998573ed9e7059ccd2059b7be96f128c4b59cafd61783662dbc2e82e6ab9ced789eadb3260ed0f259d863ed09aac

  • SSDEEP

    24576:HQ9/RM4BWkXcXQIUhSy1iEqMTjYmKTvmUmC4d5:wdSEdcgI4S6jq0Ym0Nq5

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      P.I. 84092.exe

    • Size

      974KB

    • MD5

      e2f95206ce22780f53f11cf27d7219e2

    • SHA1

      484c55ec5970417fd2a9a79222c916362d1ee51c

    • SHA256

      075665ebaec6c2481ff19177b4887d9ff996c4ead668dc4cc15a64264585fade

    • SHA512

      103219e9cc76dc7bccccac56e80ebe0fc7d5bcc8151ba1e12cd6fa1a2af9f17793219b4b7e5839aa6f7bdb14b2942f28a8ef2190a8a8bacbc548941716cc6eae

    • SSDEEP

      24576:lf/2eBiCvoXQIwhS6rYEuE5Da08vv80mCCM:lfOuRogIGS8JuEa08N5

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks