General

  • Target

    9c01f3a82e49bfa8d66bffbcf50a162c45cf654f4a3f125b2052138fc29ffc39.exe

  • Size

    1021KB

  • Sample

    241127-dbnqvatjc1

  • MD5

    f388bd3c65ff8d8b5155feb5e281a031

  • SHA1

    6cbf597a4698dc8cd6f94f125d4c02e492e0d6bc

  • SHA256

    9c01f3a82e49bfa8d66bffbcf50a162c45cf654f4a3f125b2052138fc29ffc39

  • SHA512

    ecf415e2fda534b76660ba4859b0dc3fa2726ad643d33d6340977b83e981db2851e54c96d088b3edbdff860e2c0da2f4917d894ebd778dcf0b3087a01980e3b8

  • SSDEEP

    24576:stb20pkaCqT5TBWgNQ7aMrJGF6WquYeq6A:VVg5tQ7aM0QWq/5

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7157329086:AAGOsSc2V0wvMRyvFFXhUVN6YYkkxDpjHDU/sendMessage?chat_id=7337843299

Targets

    • Target

      9c01f3a82e49bfa8d66bffbcf50a162c45cf654f4a3f125b2052138fc29ffc39.exe

    • Size

      1021KB

    • MD5

      f388bd3c65ff8d8b5155feb5e281a031

    • SHA1

      6cbf597a4698dc8cd6f94f125d4c02e492e0d6bc

    • SHA256

      9c01f3a82e49bfa8d66bffbcf50a162c45cf654f4a3f125b2052138fc29ffc39

    • SHA512

      ecf415e2fda534b76660ba4859b0dc3fa2726ad643d33d6340977b83e981db2851e54c96d088b3edbdff860e2c0da2f4917d894ebd778dcf0b3087a01980e3b8

    • SSDEEP

      24576:stb20pkaCqT5TBWgNQ7aMrJGF6WquYeq6A:VVg5tQ7aM0QWq/5

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks