General

  • Target

    9843d3697d4998e63df6e33939a163e4ebe4f3a8f50f292508992b16680950e5.exe

  • Size

    1024KB

  • Sample

    250110-r6g4faxmew

  • MD5

    13e4d4a655db53282e89478eb1fdd462

  • SHA1

    1b72c5e4e03807aa857f095db92a76e36fd2b0cd

  • SHA256

    9843d3697d4998e63df6e33939a163e4ebe4f3a8f50f292508992b16680950e5

  • SHA512

    01e08a87f0f26fdac2854945e55f37fb1215e7b4b2cff85575b590c4a75a6e77e35d941897bdb2f782a418a15410ebd48916a79a4e0774ec3407673d443bd2d1

  • SSDEEP

    24576:qu6J33O0c+JY5UZ+XC0kGso6Faj2n7pbWY:cu0c++OCvkGs9FajW7gY

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7735874420:AAHB5lmusBq4MdXRakEVmgMVQ6wUkxr5YLE/sendMessage?chat_id=2146433139

Targets

    • Target

      9843d3697d4998e63df6e33939a163e4ebe4f3a8f50f292508992b16680950e5.exe

    • Size

      1024KB

    • MD5

      13e4d4a655db53282e89478eb1fdd462

    • SHA1

      1b72c5e4e03807aa857f095db92a76e36fd2b0cd

    • SHA256

      9843d3697d4998e63df6e33939a163e4ebe4f3a8f50f292508992b16680950e5

    • SHA512

      01e08a87f0f26fdac2854945e55f37fb1215e7b4b2cff85575b590c4a75a6e77e35d941897bdb2f782a418a15410ebd48916a79a4e0774ec3407673d443bd2d1

    • SSDEEP

      24576:qu6J33O0c+JY5UZ+XC0kGso6Faj2n7pbWY:cu0c++OCvkGs9FajW7gY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks