VIPKeyLogger Infostealer in the Wild
0 min read
Prashant Kumar
Infostealers are a type of trojan used extensively by malware authors to harvest sensitive data types like login details, financial information, system data and personal identifiable information.
Recently, we observed an increase in activity from a new infostealer known as VIPKeyLogger. In this blog post, we will analyze it in more detail.
VIPKeyLogger shares a lot in common with the subscription-based Snake Keylogger, which is also known as 404 Keylogger.
This new infostealer circulates through phishing campaigns as an attachment that takes the form of an archive or Microsoft 365 files. The archive contains executable content in Microsoft Office files spread via C2.
Attack chain:
Email file:
Malicious Doc file
The file looks like other files related to CVE-2017-11882. On dissecting the file, we see it’s an rtf file from the file headers.
On checking a dump of the file, we find objdata below, which contains encoded contents.
From here, we can dump the objdata to see the content itself.
For the next part, we dump other objects. From there, we can see some content related to object data that further resolves to an URL and downloads malicious executable.
On removing blank lines and whitespaces, we can restore the object data which is responsible for forming a URL:
The content in Fig. 6 is responsible for connecting to URL “http[:]//87[.]120.84.39/txt/xXdqUOrM1vD3An[.]exe and downloading malicious file.
The downloaded file is found to be a .NET compiled file as shown below in Fig. 7:
Next step, we look closer using DnSpy. The actual file loads with name skkV[.]exe irrespective of the actual file name.
The file contains several classes. Execution starts from MainForm() class which has several ToCharArray conversions.
Under the Resource section, there is a bitmap image named “vmGP” which looks like noisy, grainy image. The obfuscated code is hidden in this stenographic image.
On further analysis, we found that this payload exfiltrates various data such as PC names, country names, clipboard data, screenshots, cookies, bowser history and more. It sends harvested information via Telegram to Dynamic DuckDNS servers from the file loaded into memory as shown in the four images below:
Conclusion:
Keyloggers are one of the most common threats in a hacker's arsenal. They are delivered through phishing campaigns hosting malicious attachments in the form of a lure. These infected files exist to steal as much information from a victim’s system as possible.
When users click the bait to open the archive file, it drops/downloads the infected file in temporary or startup folder for persistence. When opened, the Microsoft 365 or archive file attachment downloads a file in %AppData\Roaming% directory, executes and deletes itself and copies injected content to the actual file where it was executed. It then performs series of data exfiltration such as recording keystrokes, collecting information like clipboard data, screenshots, browser history, cookies and email configuration details. It sends the harvested data via Telegram to Dynamic DuckDNS C2 servers.
Protection statement
Forcepoint customers are protected against this threat at the following stages of attack:
- Stage 2 (Lure) – Malicious attachments associated with these attacks are identified and blocked.
- Stage 3 (Redirect) – Blocked URLs which downloads further payload
- Stage 5 (Dropper File) - The dropper files are added to Forcepoint malicious database and are blocked.
- Stage 6 (Call Home) - Blocked C2 credentials
IOCs
RTF hash | a7fb35d35eb23fe3b4358e3c843f5982a161534e |
Dropped exe | 2830f9d5f41bbecd2ae105ed0b9a8d49327c8594 |
Malicious URL | hxxp://87.120.84[.]39/txt/xXdquUOrM1vD3An.exe hxxp://51.38.247[.]67:8081/_send_.php?L |
C2 | varders.kozow[.]com:8081 aborters.duckdns[.]org:8081 anotherarmy.dns[.]army:8081 mail.jhxkgroup[.]online |
Prashant Kumar
Read more articles by Prashant KumarPrashant serves as a Security Researcher for the X-Labs Threat Research Content. He spends his time researching web and email-based cyberattacks with a particular focus on URL research, email security and analyzing malware campaigns.
- Microsoft 365 Data Security Playbook
In the Article
- Microsoft 365 Data Security PlaybookRead the eBook
X-Labs
Get insight, analysis & news straight to your inbox
To the Point
Cybersecurity
A Podcast covering latest trends and topics in the world of cybersecurity
Listen Now