General

  • Target

    5ceb866b71b67cd11b3453f48459f358770331beef591d9d21d8023c390782e6.exe

  • Size

    799KB

  • Sample

    241106-c7w7estblh

  • MD5

    c308b7ab1f38826518a16f0fdd1a109f

  • SHA1

    b85cd4588c0d46594eac9bea6acd8c080665b5c3

  • SHA256

    5ceb866b71b67cd11b3453f48459f358770331beef591d9d21d8023c390782e6

  • SHA512

    6791df96ad2e6bbd2a53fa75393fe0c93716cd8468ef6380ac2331ca392c4068c757fe5c5200c8faccb938cbe8564125c5cf76024f2c3c0f8ccc21af40953031

  • SSDEEP

    24576:ZrQSoKm1xXI+h9lbhfX1ShohtTFiEy4+M/hhcOa4HW:ZkSdEI+B9X1jTFiEylMn

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7942430957:AAFpG_qcZ_VP0Ad6GO4uIs3rZU61omVdnz4/sendMessage?chat_id=6542615755

Targets

    • Target

      5ceb866b71b67cd11b3453f48459f358770331beef591d9d21d8023c390782e6.exe

    • Size

      799KB

    • MD5

      c308b7ab1f38826518a16f0fdd1a109f

    • SHA1

      b85cd4588c0d46594eac9bea6acd8c080665b5c3

    • SHA256

      5ceb866b71b67cd11b3453f48459f358770331beef591d9d21d8023c390782e6

    • SHA512

      6791df96ad2e6bbd2a53fa75393fe0c93716cd8468ef6380ac2331ca392c4068c757fe5c5200c8faccb938cbe8564125c5cf76024f2c3c0f8ccc21af40953031

    • SSDEEP

      24576:ZrQSoKm1xXI+h9lbhfX1ShohtTFiEy4+M/hhcOa4HW:ZkSdEI+B9X1jTFiEylMn

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks