General

  • Target

    b07790927beaf1cc2d81cf76f0081c7c264c3133fe71437ca4bd26e220800d43

  • Size

    796KB

  • Sample

    241117-a225daxdra

  • MD5

    4cf66de9bfdf5bb65b4151f456db83df

  • SHA1

    8245fc47d7d1833882b90bbd1fe99d13b2335929

  • SHA256

    b07790927beaf1cc2d81cf76f0081c7c264c3133fe71437ca4bd26e220800d43

  • SHA512

    40a7727ee0786ab38fcedb5d0795e1524bba27e375fe0a756541e39412428b41a78674a546e492e388d3d0c69be75c405a9c4b1fde8fc9c21a08ddb702f8ce5d

  • SSDEEP

    24576:HwZRZ2F+K76bdAO5ZNWHX0xVgDJVqtjd:QN2gK7AZNW30xGixd

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8/sendMessage?chat_id=8178506397

Targets

    • Target

      b07790927beaf1cc2d81cf76f0081c7c264c3133fe71437ca4bd26e220800d43

    • Size

      796KB

    • MD5

      4cf66de9bfdf5bb65b4151f456db83df

    • SHA1

      8245fc47d7d1833882b90bbd1fe99d13b2335929

    • SHA256

      b07790927beaf1cc2d81cf76f0081c7c264c3133fe71437ca4bd26e220800d43

    • SHA512

      40a7727ee0786ab38fcedb5d0795e1524bba27e375fe0a756541e39412428b41a78674a546e492e388d3d0c69be75c405a9c4b1fde8fc9c21a08ddb702f8ce5d

    • SSDEEP

      24576:HwZRZ2F+K76bdAO5ZNWHX0xVgDJVqtjd:QN2gK7AZNW30xGixd

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks