Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    050df8bfd189bd7a1afd68570e091e8a72e3e4b98ad8ac232df0743e7c057f51

  • Size

    766KB

  • Sample

    240906-h1qzqatbjg

  • MD5

    b4802f261224f8520d3e4163cf6b130c

  • SHA1

    3777ead2b4fb46341968a3282879c2f76bff79e5

  • SHA256

    050df8bfd189bd7a1afd68570e091e8a72e3e4b98ad8ac232df0743e7c057f51

  • SHA512

    82cd1b4a9cef4d0ec25cfe54c8f85d39aeaa05803b5f265b7f83221ba4886c8c63941c6c254489631ec48b1ee701118021ebc84821b6b954d195ce62714b833b

  • SSDEEP

    12288:kqDAgBcvRYW5OKhkTcJScvRMOmR237PXFXy70wjPR0qjpkR:kq3Bc2W5OYJRbmRoz16JRg

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7225408063:AAEgGgg3GKLOlD5GJRf4Ls9TO1C7A1S8af8/sendMessage?chat_id=6089330336

Targets

    • Target

      050df8bfd189bd7a1afd68570e091e8a72e3e4b98ad8ac232df0743e7c057f51

    • Size

      766KB

    • MD5

      b4802f261224f8520d3e4163cf6b130c

    • SHA1

      3777ead2b4fb46341968a3282879c2f76bff79e5

    • SHA256

      050df8bfd189bd7a1afd68570e091e8a72e3e4b98ad8ac232df0743e7c057f51

    • SHA512

      82cd1b4a9cef4d0ec25cfe54c8f85d39aeaa05803b5f265b7f83221ba4886c8c63941c6c254489631ec48b1ee701118021ebc84821b6b954d195ce62714b833b

    • SSDEEP

      12288:kqDAgBcvRYW5OKhkTcJScvRMOmR237PXFXy70wjPR0qjpkR:kq3Bc2W5OYJRbmRoz16JRg

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks