General

  • Target

    Bukti-Transfer...exe

  • Size

    796KB

  • Sample

    241005-f3fwesxgkn

  • MD5

    5da3bb486cd01d0f69bdd42a41159d8e

  • SHA1

    56828b19b5fa792f28c7f1b1ea28a0d00f767ad4

  • SHA256

    151db88b9f1c5c2756961e29f92315334d24ee01e47ec548fb9e581098295feb

  • SHA512

    075c09947d17e9201559ab9dfe614f7f737bad047bf749265a3a9e43fd5d087d99c1186340ea0740ad11d5f4694e330d5514df4e63990e0e5b46197aa4152604

  • SSDEEP

    12288:bLY99vzriMpveHQQDnp4fYvnt7utmxgcbNy5z5kEo8biUUOqMu4UXLEKJDSkR:bc9BNeHQ6paYvnt+m2bloCUt4UXYUh

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7781909828:AAGxf3G8mJh3__EDREqe-hOffvHxYbcsXBg/sendMessage?chat_id=2008065161

Targets

    • Target

      Bukti-Transfer...exe

    • Size

      796KB

    • MD5

      5da3bb486cd01d0f69bdd42a41159d8e

    • SHA1

      56828b19b5fa792f28c7f1b1ea28a0d00f767ad4

    • SHA256

      151db88b9f1c5c2756961e29f92315334d24ee01e47ec548fb9e581098295feb

    • SHA512

      075c09947d17e9201559ab9dfe614f7f737bad047bf749265a3a9e43fd5d087d99c1186340ea0740ad11d5f4694e330d5514df4e63990e0e5b46197aa4152604

    • SSDEEP

      12288:bLY99vzriMpveHQQDnp4fYvnt7utmxgcbNy5z5kEo8biUUOqMu4UXLEKJDSkR:bc9BNeHQ6paYvnt+m2bloCUt4UXYUh

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks