General

  • Target

    8d5ad043ae91a80f57574f52b78402a7497b7377a29ebd2401c1f42ef0c41617.exe

  • Size

    2.7MB

  • Sample

    250111-ewf26swmbj

  • MD5

    6776d32ed5b26c788e25c1632b555d47

  • SHA1

    ca579bfb0a3a85fd0c234385d1fc5873a19d11a4

  • SHA256

    8d5ad043ae91a80f57574f52b78402a7497b7377a29ebd2401c1f42ef0c41617

  • SHA512

    aecb65a4d5d6d645910ce651a3277d97f4a51b145b0edfd1d1c495d6a915acb18a654b6fa81c7d7d57d7ebcb5215286c3df9802f682695f9c06e8ff52e92df12

  • SSDEEP

    49152:oKQK2r0YVjKDyOSRTzsTSKC7o5lq/Ucqw:nZ2IYVjKDyOSJzJKCse/E

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7365820770:AAFcSgCB-t8aplspIAYTFtpf48_ydah4lyE/sendMessage?chat_id=5830304904

Targets

    • Target

      8d5ad043ae91a80f57574f52b78402a7497b7377a29ebd2401c1f42ef0c41617.exe

    • Size

      2.7MB

    • MD5

      6776d32ed5b26c788e25c1632b555d47

    • SHA1

      ca579bfb0a3a85fd0c234385d1fc5873a19d11a4

    • SHA256

      8d5ad043ae91a80f57574f52b78402a7497b7377a29ebd2401c1f42ef0c41617

    • SHA512

      aecb65a4d5d6d645910ce651a3277d97f4a51b145b0edfd1d1c495d6a915acb18a654b6fa81c7d7d57d7ebcb5215286c3df9802f682695f9c06e8ff52e92df12

    • SSDEEP

      49152:oKQK2r0YVjKDyOSRTzsTSKC7o5lq/Ucqw:nZ2IYVjKDyOSJzJKCse/E

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks