General

  • Target

    f2315daf1ccd6e570b919e68e41d334709d97e004db40b4dbbc84dfe97119e81

  • Size

    671KB

  • Sample

    241104-pz1abssnaj

  • MD5

    e794911190369607fd651430b5dd81ee

  • SHA1

    3e5f99eb9731bea70e1475c315146e962a0ad2b5

  • SHA256

    f2315daf1ccd6e570b919e68e41d334709d97e004db40b4dbbc84dfe97119e81

  • SHA512

    43a046c25a7370dd654c246f9c0a042f105ba7578bde702fb3746abe8cd1d37853d0639af180aae086e40f79d5864a121f0fd8d9637a1d95d0b79169010dd771

  • SSDEEP

    12288:pe/tDBwenJ6H3B6lUyEJU8HMN/WAqcxj54ft/zv5VbakUdck2WOE4eD7E:cV9HsXqoJhsJWALxj5oRvGdccXD7E

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot6107929879:AAHV6JwXs7rcYzMGLe3_opR5_gdKAC16Ye4/sendMessage?chat_id=6311012313

Targets

    • Target

      LP.O. No. 0398.com

    • Size

      790KB

    • MD5

      0279c0c1f0798bf1f7fbe610bb8c45e5

    • SHA1

      8caa2af8e1107aa9d12c24e30169d987e65ce7ae

    • SHA256

      85934bd9ea8427058f9e56a4441068c0f7dbac8746ff49e89c792448e6b0a3db

    • SHA512

      5176b0e7c4984152cc467dbeaf6db2d7f7cf3f55d38c68270272c21d8511dddfbc7a6d76d10f3a6d4d71768bd85bcc639b6bf6e24d480c67bbb02c468ba33f07

    • SSDEEP

      12288:0lxgTghZfm0Cu+e3JWH3BkOdHk13b8In5T6dJ3NDh/fP/zv5VHakl6YmbXGV:mEg/fj1UXGOdc3QI5Oz3vnzv7i

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks