General

  • Target

    411c94ebbd1a923e16ec86c25d2e3f3037595653e9ea3e1794e7ab4db10935ad

  • Size

    565KB

  • Sample

    240919-h1v9faxanq

  • MD5

    7ca1cccd9330a0c191ff3bb6278476a7

  • SHA1

    1bee55fc979f01b157353f879396f33e1e65620b

  • SHA256

    411c94ebbd1a923e16ec86c25d2e3f3037595653e9ea3e1794e7ab4db10935ad

  • SHA512

    1ee7a69f5a28e75857eabba04115f354c4bba5c66aba162b80905971d3d67bcd2735774074e0f2864dc410bfebb68242c9e5d0e881940580b2a1a25edaeadc12

  • SSDEEP

    12288:9cInM/WN3w7URDLgBhw7UT5rfuwOYC36D09UfDluKahRVjVSiO8QfFSHU:a/M3w7QLgISlfu1OluljVSiO8CSU

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7339564661:AAFzTB6gEWMndjXYyD5LCn17UEBISRR8wDI/sendMessage?chat_id=6443825857

Targets

    • Target

      PI67899876500.bat

    • Size

      1.4MB

    • MD5

      9d8f3525e0cc982394ccf4642ae034ad

    • SHA1

      d109ffe508713ee8a2f83026773450be1d9fedd4

    • SHA256

      28832b453b55958ad297a0bde3a0e483b4445371e8b9d3048ffe0db8f5321d71

    • SHA512

      ac4fde20765e090991c63dd952363729abf772fb9801f6d0170efebb721ecfe5ab81ac5b008ec1916d64f25e18fb5f364d640e7203c2783c64777c25966df915

    • SSDEEP

      12288:pjM9XnM9WNTw7UxDL0Bhi7UVdLfWgOaCP6DY9QfDruCqdlVDVYiOm+fxWhJ:pJ9MTw7yL0GgZfWjIrurDVYiOmUIJ

    • UAC bypass

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Windows security bypass

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks