General

  • Target

    39a65d909ebc773855351aa58e95b192150baf164e6165c633a6321156452baf

  • Size

    1019KB

  • Sample

    241115-ympsha1cja

  • MD5

    28664f8d0784c730868f15becf318efe

  • SHA1

    080a7a0e5f19cc222624f9cf10a2e6df1c52d726

  • SHA256

    39a65d909ebc773855351aa58e95b192150baf164e6165c633a6321156452baf

  • SHA512

    bb93d1a04b7352f8c510dff40e77200a1b876c1c4117a811cb255160bc00ee2eda82b7c6e000d9247202b23e89f6021855a79981304f9c8b7131375e5078ade1

  • SSDEEP

    24576:HAHnh+eWsN3skA4RV1Hom2KXMmHawap00a6kZ/K5:6h+ZkldoPK8YawuBk6

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7563060616:AAGgGu8pocoVNLzoow0Ge2U2GVDS9nDmL6Q/sendMessage?chat_id=7222025033

Targets

    • Target

      39a65d909ebc773855351aa58e95b192150baf164e6165c633a6321156452baf

    • Size

      1019KB

    • MD5

      28664f8d0784c730868f15becf318efe

    • SHA1

      080a7a0e5f19cc222624f9cf10a2e6df1c52d726

    • SHA256

      39a65d909ebc773855351aa58e95b192150baf164e6165c633a6321156452baf

    • SHA512

      bb93d1a04b7352f8c510dff40e77200a1b876c1c4117a811cb255160bc00ee2eda82b7c6e000d9247202b23e89f6021855a79981304f9c8b7131375e5078ade1

    • SSDEEP

      24576:HAHnh+eWsN3skA4RV1Hom2KXMmHawap00a6kZ/K5:6h+ZkldoPK8YawuBk6

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks