General

  • Target

    368ea2fe8a9826ec9931cd21979213a0444cdbe7cf3f6bcadf1a0373822c510c.exe

  • Size

    548KB

  • Sample

    241120-cy6z9stkfn

  • MD5

    59200787f2077fc98f9294ff5689c2c2

  • SHA1

    23138122229e03128b08ec086061d88d161f6e0c

  • SHA256

    368ea2fe8a9826ec9931cd21979213a0444cdbe7cf3f6bcadf1a0373822c510c

  • SHA512

    2d0b2e16e3ef8fe8a2cfb6ba16265d8fac6b13221cdb1a263d74f688d2efd65c7e9569901762f97df57e6ab8b4f2df8f50c54203762c08639fe1d307122d8691

  • SSDEEP

    12288:32EIGrEDwVYX4HG3MlF50Fe6a2KDZ5Qq/Tmd3ZhZk:3wGrgyGe50m2K95QqrmdPZk

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot8124032214:AAHsMb8ZSRX6oiufFz1tRalXrmGjYujuzB4/sendMessage?chat_id=6198188190

Targets

    • Target

      368ea2fe8a9826ec9931cd21979213a0444cdbe7cf3f6bcadf1a0373822c510c.exe

    • Size

      548KB

    • MD5

      59200787f2077fc98f9294ff5689c2c2

    • SHA1

      23138122229e03128b08ec086061d88d161f6e0c

    • SHA256

      368ea2fe8a9826ec9931cd21979213a0444cdbe7cf3f6bcadf1a0373822c510c

    • SHA512

      2d0b2e16e3ef8fe8a2cfb6ba16265d8fac6b13221cdb1a263d74f688d2efd65c7e9569901762f97df57e6ab8b4f2df8f50c54203762c08639fe1d307122d8691

    • SSDEEP

      12288:32EIGrEDwVYX4HG3MlF50Fe6a2KDZ5Qq/Tmd3ZhZk:3wGrgyGe50m2K95QqrmdPZk

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      75ed96254fbf894e42058062b4b4f0d1

    • SHA1

      996503f1383b49021eb3427bc28d13b5bbd11977

    • SHA256

      a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7

    • SHA512

      58174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4

    • SSDEEP

      192:X24sihno0bW+l97H4GB7QDs91kMtwtobTr4u+QHbazMNHT7dmNIEr:m8vJl97JeoxtN/r3z7YV

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks