General

  • Target

    701cc76315954f7e5e8b0fb36db44cdb6e6e40384be529670490523be1429d8f.exe

  • Size

    834KB

  • Sample

    250116-ddn5dsxrhx

  • MD5

    eba7ff0d3cb799af22795e1d3c55360c

  • SHA1

    e09436242af4a602b31b40571bebe468c229a4fb

  • SHA256

    701cc76315954f7e5e8b0fb36db44cdb6e6e40384be529670490523be1429d8f

  • SHA512

    61ff14d46ec42deafbbd978fde98f67accdb9ca84d884dd003a1c24015b540ecde40209eb0eee243a485e382e7ed8ee1d1feaaef3b3c5173a9919df5c52a6dc2

  • SSDEEP

    24576:76JN+UVsa/olbtDr4eD+Rq9B4of+mpZwobRUcx/LoB:O3+Ufq7+R6FpZjbBuB

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7946291525:AAFHJlyjrW7RJiLewU0S0ya89C3MpMemoiQ/sendMessage?chat_id=7727510436

Targets

    • Target

      701cc76315954f7e5e8b0fb36db44cdb6e6e40384be529670490523be1429d8f.exe

    • Size

      834KB

    • MD5

      eba7ff0d3cb799af22795e1d3c55360c

    • SHA1

      e09436242af4a602b31b40571bebe468c229a4fb

    • SHA256

      701cc76315954f7e5e8b0fb36db44cdb6e6e40384be529670490523be1429d8f

    • SHA512

      61ff14d46ec42deafbbd978fde98f67accdb9ca84d884dd003a1c24015b540ecde40209eb0eee243a485e382e7ed8ee1d1feaaef3b3c5173a9919df5c52a6dc2

    • SSDEEP

      24576:76JN+UVsa/olbtDr4eD+Rq9B4of+mpZwobRUcx/LoB:O3+Ufq7+R6FpZjbBuB

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks