General

  • Target

    H760MHPOWERTOPDRIVE.exe

  • Size

    1001KB

  • Sample

    241128-t5fkbsynbk

  • MD5

    d92a6a3ee6377f63c6ec95f7efb6da26

  • SHA1

    b137b806e5a64d69e20fff5877a8c1d2fc15d0cb

  • SHA256

    7bc0ac48b0f23d5b80758d2332f57c2bff160f93335ff72e101d0fa2c6914bb6

  • SHA512

    402a036c4f9169641390e938b19887c966bc4a41480e024b93ae3e743a6b1fb7f6e4acb6fd6edb91b6c9154ee53cf5d16b9dc62d7e63efaf521abb09646e8824

  • SSDEEP

    24576:Utb20pkaCqT5TBWgNQ7aq2UShpIFcS6A:9Vg5tQ7aq2phOFX5

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7567650575:AAHvGGF6TZiX_cMd8iYGZUXmOL-zDO7vZNI/sendMessage?chat_id=7654658491

Targets

    • Target

      H760MHPOWERTOPDRIVE.exe

    • Size

      1001KB

    • MD5

      d92a6a3ee6377f63c6ec95f7efb6da26

    • SHA1

      b137b806e5a64d69e20fff5877a8c1d2fc15d0cb

    • SHA256

      7bc0ac48b0f23d5b80758d2332f57c2bff160f93335ff72e101d0fa2c6914bb6

    • SHA512

      402a036c4f9169641390e938b19887c966bc4a41480e024b93ae3e743a6b1fb7f6e4acb6fd6edb91b6c9154ee53cf5d16b9dc62d7e63efaf521abb09646e8824

    • SSDEEP

      24576:Utb20pkaCqT5TBWgNQ7aq2UShpIFcS6A:9Vg5tQ7aq2phOFX5

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks