General

  • Target

    09e6fd65-9691-4eb8-e6f7-08dd0dce4a80.gz

  • Size

    240KB

  • Sample

    241205-jgg35s1jhk

  • MD5

    433eab0a6440defff2889c24164ec8af

  • SHA1

    5c98180cd51bf285782bcd27e4e4e6efff584089

  • SHA256

    449b00d6aca53af24c348bcc96efc782ab99222a23abc9f15b4e4dd08844b802

  • SHA512

    015cffafd99d48eba181df9a724825915642b749ba0e7b37c88734b7882d00ce1ee88dbf98201503ee4b36e012ed92c4277afd2c4c0c78540b2a3614ae3d69b3

  • SSDEEP

    6144:15hhojmSGOAIeI/iLgKHlDiSWEXAD0lYE1qDR5oRq8l:nhSjqOfeUi1dVXAoYE1qDRCRq6

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7925978922:AAECifW4bGh1utN6hfeEFfhRG36owOqQd_I/sendMessage?chat_id=7373943284

Targets

    • Target

      Po-5865A.exe

    • Size

      372KB

    • MD5

      b6cc16fae7d4f3ce14186b64a470bf8b

    • SHA1

      f12cad09a8680cfdad9b917a65f14a62e1d24ee1

    • SHA256

      0f4ab8526c11090dbf09fd353384e14cf3af8c40646fb7cd67810feda230bae0

    • SHA512

      462ee669d6d8b83d15c8075dbb598677671d2c024341bf6813229a09a9d587a0b73386c96c96f0c5092a6d14e6175c120e43e43289b014477b38033a4b92bb2d

    • SSDEEP

      6144:D3mVSTcqfFrDOJfSLTJfJQ/zOjffRzF1wwJrDA0gbSyZDSQOwfPnRjH/Zc3Ys+q1:YSrt+K/JRzF1wwJrDA0gbfcEfvRjBcPu

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks