General

  • Target

    de03f861a4a0f5d44f617f4ef4a44388a6413398c5f3d88c1b65c09499ba03e0

  • Size

    818KB

  • Sample

    250227-jw7bks1vgx

  • MD5

    86557fe26ed68f9616f948b12a5cb72b

  • SHA1

    a099612e3ed3beb8507fff457982d636f91f6fa7

  • SHA256

    de03f861a4a0f5d44f617f4ef4a44388a6413398c5f3d88c1b65c09499ba03e0

  • SHA512

    e47320313cacb3d3524c0013882c69589a886260bc8a27f7efbde843d607726c4ca759ad080bea0632d8a7a77829c14a0defeedab682bfa98776604c58bb6716

  • SSDEEP

    24576:/Q9/RM4BWkXcXQIUhSy1iEqMTjYmKTvmUmC4dx:YdSEdcgI4S6jq0Ym0Nqx

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      attach bank copy 9840.exe

    • Size

      974KB

    • MD5

      e2f95206ce22780f53f11cf27d7219e2

    • SHA1

      484c55ec5970417fd2a9a79222c916362d1ee51c

    • SHA256

      075665ebaec6c2481ff19177b4887d9ff996c4ead668dc4cc15a64264585fade

    • SHA512

      103219e9cc76dc7bccccac56e80ebe0fc7d5bcc8151ba1e12cd6fa1a2af9f17793219b4b7e5839aa6f7bdb14b2942f28a8ef2190a8a8bacbc548941716cc6eae

    • SSDEEP

      24576:lf/2eBiCvoXQIwhS6rYEuE5Da08vv80mCCM:lfOuRogIGS8JuEa08N5

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks