General

  • Target

    Order requirements CIF Greece_pdf.exe

  • Size

    813KB

  • Sample

    241121-lnrbhavqer

  • MD5

    998e394361bd54c58a1ad2092fca8b6c

  • SHA1

    c68e7856324a50c04ee5e1de46952ecaed47eff7

  • SHA256

    87f519d29ebc3fb1b6bed4a5e7ac4865b029da69d2608548a8db34e4069673ec

  • SHA512

    bb7af9d97e4fed96e000048828826f715fa3f229058326da25cf535629e567389b6129e72b6ef214937f0429d74d35598a7f440af6221ecc56ddeea86f9733b1

  • SSDEEP

    12288:a7CBVenOxJUbx7lU0hbB6y3bn6vlP9Ia8GIbPYkAdwvLRPC6Oe73MFce:6G+OxmF7mSB6yrnMIacPYkAevLRPJyF

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot8065526741:AAEj68BwW3BsUStAxrPkDSB2kLxwQ3yik84/sendMessage?chat_id=6897585916

Targets

    • Target

      Order requirements CIF Greece_pdf.exe

    • Size

      813KB

    • MD5

      998e394361bd54c58a1ad2092fca8b6c

    • SHA1

      c68e7856324a50c04ee5e1de46952ecaed47eff7

    • SHA256

      87f519d29ebc3fb1b6bed4a5e7ac4865b029da69d2608548a8db34e4069673ec

    • SHA512

      bb7af9d97e4fed96e000048828826f715fa3f229058326da25cf535629e567389b6129e72b6ef214937f0429d74d35598a7f440af6221ecc56ddeea86f9733b1

    • SSDEEP

      12288:a7CBVenOxJUbx7lU0hbB6y3bn6vlP9Ia8GIbPYkAdwvLRPC6Oe73MFce:6G+OxmF7mSB6yrnMIacPYkAevLRPJyF

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Accesses Microsoft Outlook profiles

    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks