Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    malware.exe

  • Size

    659KB

  • Sample

    250325-m4wrlavwcv

  • MD5

    37d6eb581b7ee935d965b21a56949a37

  • SHA1

    0f66f5e6adfe6a24c1dba303d7eef831bfac62df

  • SHA256

    0003cf72e0eda9f0e4b36d4fdb7017c9d56260f37b8f0e114a9cadb0a57b9ce4

  • SHA512

    877bad1a2dacc5149c9767dd0bffada4460032d2b76eb7ded1de5a7422a74b6aec29d47dbe155d9a39eae7819e23a086fb1474bf0fdb94be5cf518d027a7844c

  • SSDEEP

    12288:jY7kv5NH+x4KbZO0EZImx/dkQXqzr7QfHIapF+xgWfecd0+AjlwXzGTNej3UF+gX:jYo5NHcFy/dkkOXQfoe+LGcVqLAg

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    (lqKKXb5

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      malware.exe

    • Size

      659KB

    • MD5

      37d6eb581b7ee935d965b21a56949a37

    • SHA1

      0f66f5e6adfe6a24c1dba303d7eef831bfac62df

    • SHA256

      0003cf72e0eda9f0e4b36d4fdb7017c9d56260f37b8f0e114a9cadb0a57b9ce4

    • SHA512

      877bad1a2dacc5149c9767dd0bffada4460032d2b76eb7ded1de5a7422a74b6aec29d47dbe155d9a39eae7819e23a086fb1474bf0fdb94be5cf518d027a7844c

    • SSDEEP

      12288:jY7kv5NH+x4KbZO0EZImx/dkQXqzr7QfHIapF+xgWfecd0+AjlwXzGTNej3UF+gX:jYo5NHcFy/dkkOXQfoe+LGcVqLAg

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks