General

  • Target

    81e019eec1b1f11c799784692f81a936c003371874b968409923517bab7b70ac

  • Size

    3.0MB

  • Sample

    241031-rahebszemj

  • MD5

    9e1f6833062853fe34cf620511b08662

  • SHA1

    9f409adb2ddc3a06f1b73b888d6649d4bdaddee7

  • SHA256

    81e019eec1b1f11c799784692f81a936c003371874b968409923517bab7b70ac

  • SHA512

    f336d99d4adcf640584d6cd72293d10bc2372d66e9e254f9f1dc17208e8ca8305f7d27522639b75cd527ee407dcf7adae64c2920e4d7921018ab9099ad2c7bd5

  • SSDEEP

    12288:bRW0lR858YtZX9UVJd+ihYsZJQM9ZLCIyEaSs3Wuk7WtbQw0QLcVG7xMHZ:bRW0lPWZG9Pjdtv+3WdUd0Y5xsZ

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7580957702:AAF09QqagTzh-M7zSCZovqxkmwhkdAGG1yI/sendMessage?chat_id=7105655241

Targets

    • Target

      81e019eec1b1f11c799784692f81a936c003371874b968409923517bab7b70ac

    • Size

      3.0MB

    • MD5

      9e1f6833062853fe34cf620511b08662

    • SHA1

      9f409adb2ddc3a06f1b73b888d6649d4bdaddee7

    • SHA256

      81e019eec1b1f11c799784692f81a936c003371874b968409923517bab7b70ac

    • SHA512

      f336d99d4adcf640584d6cd72293d10bc2372d66e9e254f9f1dc17208e8ca8305f7d27522639b75cd527ee407dcf7adae64c2920e4d7921018ab9099ad2c7bd5

    • SSDEEP

      12288:bRW0lR858YtZX9UVJd+ihYsZJQM9ZLCIyEaSs3Wuk7WtbQw0QLcVG7xMHZ:bRW0lPWZG9Pjdtv+3WdUd0Y5xsZ

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks