General

  • Target

    13012025_1558_13012025_PDF-3093900299039 pdf.rar

  • Size

    368KB

  • Sample

    250113-tegdyaxpbx

  • MD5

    261a5a4a91e53be1001ee7570edc3795

  • SHA1

    05b523792ee13206e41fc419d315d6c6f5a084f4

  • SHA256

    642a7b00bd466d8b6153a562b566e8840f1441593bb49853055b533ab36a0c00

  • SHA512

    9d74cac6e5dd9e2a86d8f252ccccc85af398459645992e6eb9f765fea0f1f9fdc039d3214d0e21d83950cff99940ec448804e1d90dded6c84ec33d2c936d20aa

  • SSDEEP

    6144:e4laeacHLPfmFaXPxIrwXq4gqy+sANQ5Bfwq9ARTyUlV62Xh98ZH3gCcRWD7Xls+:jaqHLXbJZ4qnSBfwq9q62R9AH3g5WNlV

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7199790900:AAH-a-1uulA8aVgkku_Nct-9FyNkWwIUg_U/sendMessage?chat_id=7437481970

Targets

    • Target

      PDF-3093900299039 pdf.exe

    • Size

      1019KB

    • MD5

      1f74495f02ad58ff437b07cf58a3e0ad

    • SHA1

      9efd59d289256116e9f539ffd7cc319603ac03ba

    • SHA256

      cd7aa2bca4b3612823b7e73160896e886a3e3ddd495c3ae7f2b47868c5dff0cf

    • SHA512

      14075253cc9e49a6dc9af8544f82db2bb4dfa814390739e6bc5d0d8f6ca74dbf6e989585977f968a1905f4d7c55220c11617886f6dc29a4fcece97b608feeecd

    • SSDEEP

      24576:rMaSSKy2/SPNichdpPEcw88Cco4H4444C:rRQrc5PEcwi4H4444C

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks