General
-
Target
411c94ebbd1a923e16ec86c25d2e3f3037595653e9ea3e1794e7ab4db10935ad
-
Size
565KB
-
Sample
240919-h1v9faxanq
-
MD5
7ca1cccd9330a0c191ff3bb6278476a7
-
SHA1
1bee55fc979f01b157353f879396f33e1e65620b
-
SHA256
411c94ebbd1a923e16ec86c25d2e3f3037595653e9ea3e1794e7ab4db10935ad
-
SHA512
1ee7a69f5a28e75857eabba04115f354c4bba5c66aba162b80905971d3d67bcd2735774074e0f2864dc410bfebb68242c9e5d0e881940580b2a1a25edaeadc12
-
SSDEEP
12288:9cInM/WN3w7URDLgBhw7UT5rfuwOYC36D09UfDluKahRVjVSiO8QfFSHU:a/M3w7QLgISlfu1OluljVSiO8CSU
Static task
static1
Behavioral task
behavioral1
Sample
PI67899876500.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PI67899876500.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7339564661:AAFzTB6gEWMndjXYyD5LCn17UEBISRR8wDI/sendMessage?chat_id=6443825857
Targets
-
-
Target
PI67899876500.bat
-
Size
1.4MB
-
MD5
9d8f3525e0cc982394ccf4642ae034ad
-
SHA1
d109ffe508713ee8a2f83026773450be1d9fedd4
-
SHA256
28832b453b55958ad297a0bde3a0e483b4445371e8b9d3048ffe0db8f5321d71
-
SHA512
ac4fde20765e090991c63dd952363729abf772fb9801f6d0170efebb721ecfe5ab81ac5b008ec1916d64f25e18fb5f364d640e7203c2783c64777c25966df915
-
SSDEEP
12288:pjM9XnM9WNTw7UxDL0Bhi7UVdLfWgOaCP6DY9QfDruCqdlVDVYiOm+fxWhJ:pJ9MTw7yL0GgZfWjIrurDVYiOmUIJ
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Scripting
1