Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    0c82cb659588d03f5f22c2619be0167b49daf4ffbc4890b876a3fcdb4b1ade0a.exe

  • Size

    807KB

  • Sample

    241113-tjx79avelc

  • MD5

    4ea7acbe07832a24452ca2e2bb266a7c

  • SHA1

    21450df2716bfc58c002e342be12b0013756d537

  • SHA256

    0c82cb659588d03f5f22c2619be0167b49daf4ffbc4890b876a3fcdb4b1ade0a

  • SHA512

    e63ab7b572e9eda6faeb642484d02cf9e58e358b7a06196a03f3ca68e1316c4b79d5a80fd04f485ab57e29bcf8e28e3999af1540f2b7c4b1dda91493d1ea55d0

  • SSDEEP

    24576:uvYV0HT73uF7nYjKdhfbe1BzyhEl+BD0GPpu6CHAy7N:pOzaRfrbe1wEl+BQb6C/

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot8177184706:AAEJ0_bPTtjIc-PnjNdYNmARZ2fvBD17ZJI/sendMessage?chat_id=6198188190

Targets

    • Target

      0c82cb659588d03f5f22c2619be0167b49daf4ffbc4890b876a3fcdb4b1ade0a.exe

    • Size

      807KB

    • MD5

      4ea7acbe07832a24452ca2e2bb266a7c

    • SHA1

      21450df2716bfc58c002e342be12b0013756d537

    • SHA256

      0c82cb659588d03f5f22c2619be0167b49daf4ffbc4890b876a3fcdb4b1ade0a

    • SHA512

      e63ab7b572e9eda6faeb642484d02cf9e58e358b7a06196a03f3ca68e1316c4b79d5a80fd04f485ab57e29bcf8e28e3999af1540f2b7c4b1dda91493d1ea55d0

    • SSDEEP

      24576:uvYV0HT73uF7nYjKdhfbe1BzyhEl+BD0GPpu6CHAy7N:pOzaRfrbe1wEl+BQb6C/

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.