General

  • Target

    83fe4ec313f8afce83ba4afe2634b81bbf93aa71a33f1d3c9d34bfedba32aa90

  • Size

    671KB

  • Sample

    241104-pwcd4ayqbs

  • MD5

    c77812ec1b38ffa9d0c01e4ca2c719d8

  • SHA1

    a27869444deb2d10a524021fbe852bd3ac2616aa

  • SHA256

    83fe4ec313f8afce83ba4afe2634b81bbf93aa71a33f1d3c9d34bfedba32aa90

  • SHA512

    db5ad0d2d22a1f7a9fdd95bf6b6c227e475a1c6310e116836e2481217b6b1517daaa82ad6dbf49adde8d2f28b4a83e89c947dadaaba6f16827759cefe4a644d9

  • SSDEEP

    12288:ae/tDBwenJ6H3B6lUyEJU8HMN/WAqcxj54ft/zv5VbakUdck2WOE4eD7h:pV9HsXqoJhsJWALxj5oRvGdccXD7h

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot6107929879:AAHV6JwXs7rcYzMGLe3_opR5_gdKAC16Ye4/sendMessage?chat_id=6311012313

Targets

    • Target

      Payment_Advice.com

    • Size

      790KB

    • MD5

      0279c0c1f0798bf1f7fbe610bb8c45e5

    • SHA1

      8caa2af8e1107aa9d12c24e30169d987e65ce7ae

    • SHA256

      85934bd9ea8427058f9e56a4441068c0f7dbac8746ff49e89c792448e6b0a3db

    • SHA512

      5176b0e7c4984152cc467dbeaf6db2d7f7cf3f55d38c68270272c21d8511dddfbc7a6d76d10f3a6d4d71768bd85bcc639b6bf6e24d480c67bbb02c468ba33f07

    • SSDEEP

      12288:0lxgTghZfm0Cu+e3JWH3BkOdHk13b8In5T6dJ3NDh/fP/zv5VHakl6YmbXGV:mEg/fj1UXGOdc3QI5Oz3vnzv7i

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks