General

  • Target

    40a385a79ca7174e60fd326b559e0705d47aa28cdbebbb94879699c073526c24

  • Size

    607KB

  • Sample

    241128-lx1xastnbv

  • MD5

    b7de903fdd99c06de300a701be71446d

  • SHA1

    c6605d3d096e5a85b4b69d81dac812f9ce9097e3

  • SHA256

    40a385a79ca7174e60fd326b559e0705d47aa28cdbebbb94879699c073526c24

  • SHA512

    a941bb5812ac477c01a24bd76e6a8fb90484ace5445193008ee47a35e3e6b8015fba06dea7d9cec97b36850f49455e31422bc967a08c3388c44acc3dbc78864d

  • SSDEEP

    12288:u17LXkO+WW8/SZb37cNy2+THxsF8pYcOCw1zK6dRplWpHbcfJEsABNd9Cjk:MvcyaN7ccRsF8pYzdBW1cx3AHdwk

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7157329086:AAGOsSc2V0wvMRyvFFXhUVN6YYkkxDpjHDU/sendMessage?chat_id=7337843299

Targets

    • Target

      gvvhbjnjuhugyftdrsesdtguiop.exe

    • Size

      1.0MB

    • MD5

      846c416864708d053b2bbc6b2612bdd5

    • SHA1

      1f32ba4e6694efbf7cff1acfc816cd4588e32266

    • SHA256

      3fc9216b8a01a87098877cf7ddd15deab038a03502884da4f97857055471be83

    • SHA512

      cc24eed9b37a1378feee7c68d391e927fd23ed35978903822ea85bb162c1aed6901907c34c49f9c04beb1417199ebf8b21f4c0a138d0a83d0c08db9d81a2c102

    • SSDEEP

      24576:Vtb20pkaCqT5TBWgNQ7avVdxWrcHxAPdr66A:GVg5tQ7avV/HSPdO5

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks