General

  • Target

    24092024_1249_23092024_PAYMENT COPY ADVICE [1015453827] Second Party Ref[200004494924] Second Party ID[2000044949] PDF.zip

  • Size

    691KB

  • Sample

    240924-p2kmnavgrq

  • MD5

    88a31e129682f5f51615e3eda71df707

  • SHA1

    58c9b8e134b47766149fb161b634eeed7db9eefb

  • SHA256

    314844c9429639d5e1148cf5192e837e4b4483068e294573612c8925da965657

  • SHA512

    4ae1ea12a6622aa0d52c9cc962a8a684846791d41156994a927d50cd585063be293188a3e3514af8178e69c065c39a20314d5ca7f9b9a012902cde0233693c8e

  • SSDEEP

    12288:s/pmtX2nOUouJ2x3d8YfhJy6a1hBzk2H1ilUBKS3MdpmE/scdiVQeoJ0M:AwN/B3d8ahJyz1hxqSapmIsjV+V

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7453999531:AAHcCXOdvbDJaILEpGPNgNPm4mcYsRwgAYI/sendMessage?chat_id=6200738063

Targets

    • Target

      PAYMENT COPY ADVICE [1015453827] Second Party Ref[200004494924] Second Party ID[2000044949] PDF.exe

    • Size

      1.2MB

    • MD5

      c70b9019ad3bef9b820d658aa8cde813

    • SHA1

      3863990d0e827fa3487ae4a5aab5c7162b7565f3

    • SHA256

      c2785c5668377424e7d8382d5f16de0d07eda9c394f23bf6c698b4627925c154

    • SHA512

      1e3d180d7ba5a8f9e0a47b2d3ed81d28b9d773120171ee0b22d49b055c2307dddf279080f474a28ffd889084afc7270be873d1f52c235068f0253f1a0330d62e

    • SSDEEP

      24576:GAHnh+eWsN3skA4RV1Hom2KXMmHav571Umq1sNso5:hh+ZkldoPK8YahhZq29

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Drops startup file

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks