General

  • Target

    cb4635bc37189a8c926cd1542e767eae5b9f5f9dbe7ce25b141dbf6902376ee4

  • Size

    626KB

  • Sample

    241031-rccxma1ler

  • MD5

    4244cbe1fea11815a775251d08cadff2

  • SHA1

    fa70311069750cc865c9e1aa3aa80a4764494bf6

  • SHA256

    cb4635bc37189a8c926cd1542e767eae5b9f5f9dbe7ce25b141dbf6902376ee4

  • SHA512

    327f5832422729cb4697a2afc64b6e3004123b0283ad8838360a9c171df4858de98eda198e9579d64d14c08edc4ac1a3f4b7857ceaa48dda4e493c11773e4116

  • SSDEEP

    12288:qNR8r8YnZr9URJd+wh6WZJQMFZLCIyE2SI3Wuk/WtbUwiQLYVG7XBYqV:qNvSZQRFjlZvK3WlU5iYdXBYqV

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7580957702:AAF09QqagTzh-M7zSCZovqxkmwhkdAGG1yI/sendMessage?chat_id=7105655241

Targets

    • Target

      31_10_2024_Dönemi_MEVDUAT Ekstre Bilgiler.exe

    • Size

      3.0MB

    • MD5

      9e1f6833062853fe34cf620511b08662

    • SHA1

      9f409adb2ddc3a06f1b73b888d6649d4bdaddee7

    • SHA256

      81e019eec1b1f11c799784692f81a936c003371874b968409923517bab7b70ac

    • SHA512

      f336d99d4adcf640584d6cd72293d10bc2372d66e9e254f9f1dc17208e8ca8305f7d27522639b75cd527ee407dcf7adae64c2920e4d7921018ab9099ad2c7bd5

    • SSDEEP

      12288:bRW0lR858YtZX9UVJd+ihYsZJQM9ZLCIyEaSs3Wuk7WtbQw0QLcVG7xMHZ:bRW0lPWZG9Pjdtv+3WdUd0Y5xsZ

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks