General

  • Target

    09012025_1039_07012025_OutstandingPayment.pdf.z

  • Size

    764KB

  • Sample

    250109-mva4jazmfn

  • MD5

    fce2aa5b8c9b45e4bedb875bc90aecc4

  • SHA1

    e15ec898c9eaed9183db24d6390331e867d03dd3

  • SHA256

    fbb3e02dfdf06e83eb5be6b32fae5ac96bf3304a67fafe42b04e4bdd471de18e

  • SHA512

    5021f7a3281bdfb4c29c2675587523295ad33da110d4275293ce56c938cb6d8708605ce9f802ebae5f18997dab7e2f9a5e39920458599f838207bbf3b2642ca3

  • SSDEEP

    12288:9qEBvkwYDRWMrXvJASc1Xrc2ZoEY7s9EfEg4nF+ED9EHTSwobeyF+m71zT5fjp:9qESFDRprXvJq17c2TY7s9pnFQS1bey7

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Outstanding Payment.exe

    • Size

      853KB

    • MD5

      1a2ef5b0b6ab1ea56601fc640c595154

    • SHA1

      1825fdeb18bcb4ad7f593be9d95fdcd5455134a7

    • SHA256

      6ee0bd1b50c4c20ec2ef009293c5835b527099b2e8890b374241f63263fbfc12

    • SHA512

      483f8a4f6b5e82b48b4fa69226dd3aa07bf55b9a0ccf09bd1fea22e49b48979ddc853bafec4653286d079441fc230541b531d2c56a036b7b62b7a2fea0375fc7

    • SSDEEP

      12288:BOq4E6mfJiLl95WcbQkpClSLw2stXgMBz5Nof5Nvexz3Ry1RxU3iExQ6S/RJIzYR:QEkDXpClUuQSwNGvKzunW6SZ0+

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks