General

  • Target

    PO20250115.exe

  • Size

    709KB

  • Sample

    250115-e6w65s1mdw

  • MD5

    b2ef32c2a7e45a8b789e66a48201d959

  • SHA1

    062ba278f42fb6b710ac37dd2db7e88390953246

  • SHA256

    aee37e0b121f31c8e53a9b314a06d758b1ce6b47d89f99822cdec8b9c9011d82

  • SHA512

    8835258e9735afe52ccd08d8d95167d5dbddfabe5bd2c8025cfb1c6e8262360ddb9749eb41e9bc7cfe754cae8b27c59167febff586a8518efe09f674c3b2c1a4

  • SSDEEP

    12288:ihnIF7MkLBbdAAMTfU8ELr6MeODi7itjdMV70:mnIFbAhsRAQjdMV70

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7965348925:AAGe8wdrvk9A3lxr1GIjGigodJ_zZ7prhfs/sendMessage?chat_id=6848903538

Targets

    • Target

      PO20250115.exe

    • Size

      709KB

    • MD5

      b2ef32c2a7e45a8b789e66a48201d959

    • SHA1

      062ba278f42fb6b710ac37dd2db7e88390953246

    • SHA256

      aee37e0b121f31c8e53a9b314a06d758b1ce6b47d89f99822cdec8b9c9011d82

    • SHA512

      8835258e9735afe52ccd08d8d95167d5dbddfabe5bd2c8025cfb1c6e8262360ddb9749eb41e9bc7cfe754cae8b27c59167febff586a8518efe09f674c3b2c1a4

    • SSDEEP

      12288:ihnIF7MkLBbdAAMTfU8ELr6MeODi7itjdMV70:mnIFbAhsRAQjdMV70

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks