General

  • Target

    e036b840f2d4ce7a8e097d3f8309d2363239f837936161ffb9527cec62987f87.exe

  • Size

    1.0MB

  • Sample

    250110-rx8j2axkbz

  • MD5

    cb47b81059d6e0b15ad2ab00c3491c48

  • SHA1

    4cf91a5e49a4d17f2c0d35bc52dee15ecdf155dc

  • SHA256

    e036b840f2d4ce7a8e097d3f8309d2363239f837936161ffb9527cec62987f87

  • SHA512

    ecce445bbe23f600d09357df1cd4488f958be9e2981b68a2dcba82dc41507f2b5f391ab97c7f13418b638b41f7dbb5e8d8d8946f317090d72b715eb23067d6ad

  • SSDEEP

    24576:Du6J33O0c+JY5UZ+XC0kGso6FaPAlbrjFTSd7DqBWY:Nu0c++OCvkGs9FaP6FTy7D/Y

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7489657060:AAEq5tTUQiWuuifDLGy6qn_cJN5txd73Csg/sendMessage?chat_id=1886630858

Targets

    • Target

      e036b840f2d4ce7a8e097d3f8309d2363239f837936161ffb9527cec62987f87.exe

    • Size

      1.0MB

    • MD5

      cb47b81059d6e0b15ad2ab00c3491c48

    • SHA1

      4cf91a5e49a4d17f2c0d35bc52dee15ecdf155dc

    • SHA256

      e036b840f2d4ce7a8e097d3f8309d2363239f837936161ffb9527cec62987f87

    • SHA512

      ecce445bbe23f600d09357df1cd4488f958be9e2981b68a2dcba82dc41507f2b5f391ab97c7f13418b638b41f7dbb5e8d8d8946f317090d72b715eb23067d6ad

    • SSDEEP

      24576:Du6J33O0c+JY5UZ+XC0kGso6FaPAlbrjFTSd7DqBWY:Nu0c++OCvkGs9FaP6FTy7D/Y

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks