General

  • Target

    e2855fd2cff839fc5fc04250f45c1f4d429657252888141d41743e17bdf586d4

  • Size

    1.0MB

  • Sample

    241126-vfcmtawnbm

  • MD5

    e98b81788b156fd3436bb28d77ae3506

  • SHA1

    325507cd9d3f939c47f04f75d5153485e8e82a95

  • SHA256

    e2855fd2cff839fc5fc04250f45c1f4d429657252888141d41743e17bdf586d4

  • SHA512

    3592db7793dab87de579976bd910a19980ade7a20ee2061df75d0d86466f89ca015b5aebb562809301799d56e24cf10d9a60fcd4da3d6308903476117f6d8da9

  • SSDEEP

    24576:vtb20pkaCqT5TBWgNQ7aUxEqN/kRk9M1EyP6A:sVg5tQ7aUaQkJv5

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot8109783712:AAHX64S2zMbAtd5EESNODfL2rSYCqupZWYU/sendMessage?chat_id=7174574119

Targets

    • Target

      e2855fd2cff839fc5fc04250f45c1f4d429657252888141d41743e17bdf586d4

    • Size

      1.0MB

    • MD5

      e98b81788b156fd3436bb28d77ae3506

    • SHA1

      325507cd9d3f939c47f04f75d5153485e8e82a95

    • SHA256

      e2855fd2cff839fc5fc04250f45c1f4d429657252888141d41743e17bdf586d4

    • SHA512

      3592db7793dab87de579976bd910a19980ade7a20ee2061df75d0d86466f89ca015b5aebb562809301799d56e24cf10d9a60fcd4da3d6308903476117f6d8da9

    • SSDEEP

      24576:vtb20pkaCqT5TBWgNQ7aUxEqN/kRk9M1EyP6A:sVg5tQ7aUaQkJv5

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks