General

  • Target

    0c82cb659588d03f5f22c2619be0167b49daf4ffbc4890b876a3fcdb4b1ade0a.exe

  • Size

    807KB

  • Sample

    241113-tjx79avelc

  • MD5

    4ea7acbe07832a24452ca2e2bb266a7c

  • SHA1

    21450df2716bfc58c002e342be12b0013756d537

  • SHA256

    0c82cb659588d03f5f22c2619be0167b49daf4ffbc4890b876a3fcdb4b1ade0a

  • SHA512

    e63ab7b572e9eda6faeb642484d02cf9e58e358b7a06196a03f3ca68e1316c4b79d5a80fd04f485ab57e29bcf8e28e3999af1540f2b7c4b1dda91493d1ea55d0

  • SSDEEP

    24576:uvYV0HT73uF7nYjKdhfbe1BzyhEl+BD0GPpu6CHAy7N:pOzaRfrbe1wEl+BQb6C/

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot8177184706:AAEJ0_bPTtjIc-PnjNdYNmARZ2fvBD17ZJI/sendMessage?chat_id=6198188190

Targets

    • Target

      0c82cb659588d03f5f22c2619be0167b49daf4ffbc4890b876a3fcdb4b1ade0a.exe

    • Size

      807KB

    • MD5

      4ea7acbe07832a24452ca2e2bb266a7c

    • SHA1

      21450df2716bfc58c002e342be12b0013756d537

    • SHA256

      0c82cb659588d03f5f22c2619be0167b49daf4ffbc4890b876a3fcdb4b1ade0a

    • SHA512

      e63ab7b572e9eda6faeb642484d02cf9e58e358b7a06196a03f3ca68e1316c4b79d5a80fd04f485ab57e29bcf8e28e3999af1540f2b7c4b1dda91493d1ea55d0

    • SSDEEP

      24576:uvYV0HT73uF7nYjKdhfbe1BzyhEl+BD0GPpu6CHAy7N:pOzaRfrbe1wEl+BQb6C/

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks