General

  • Target

    4ce9c69c0c0155ec9c4d948c1cc16dc38429aa971596a27ebb66f3dee41815c1

  • Size

    699KB

  • Sample

    250114-xh7xvaxrfq

  • MD5

    523d3f4d62dd3e6c152c9b1894945de4

  • SHA1

    ee479c9bc138642c8604d792c2d085064bbb9452

  • SHA256

    4ce9c69c0c0155ec9c4d948c1cc16dc38429aa971596a27ebb66f3dee41815c1

  • SHA512

    e5aa6eaa7d26305d50169d5d563a9d584b33ddf4cb1f38b237c96eb8245f9a7f010e23b93a2ba77e09e54f0acf04f94277c921363ada2345ba2f487c3577d5cd

  • SSDEEP

    12288:9OwDjW9CeQGZLo7kwkQBWm9z7CB8O4crRnlqABKQVJIbnutGq1g+hdK0ir2pv+iU:MYcC5GZ9wWauoAwbn4Gq1gmTi6swFTl4

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7284213540:AAEA6GTzE-aLsC7N4xsEZPQXRJNBbxq8q2A/sendMessage?chat_id=5302361040

Targets

    • Target

      Transferencia Interbancaria.pdf.exe

    • Size

      739KB

    • MD5

      4020a4c22166f11b4a8296037b9708f1

    • SHA1

      f28ece88b0a5470bd1d90837d4a4617522400229

    • SHA256

      cf9d5f30568a32e8458eabe324b263c7b1bb77732099a1c34a42a8edc1063c89

    • SHA512

      1aa2ee93f8b7ee320684f8f98d5863a937aaf14d4063fb1671f0618afcf04edd3da5ba6e7d835f4e126a51c3f41ca70cbcc4bf3ccd1b97d60eae6529368fb329

    • SSDEEP

      12288:Uh2PZzzL31IxEkpx4D7EtHUWyBdvd3gg5j+I7GsnR7/Z9u3O9z1pVy0N:XV/31IxEkpxUEodg2lqsnRznF1pVp

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks