General

  • Target

    rDEKONT-1_16_2025__75kb__pdf.exe

  • Size

    912KB

  • Sample

    250116-gqvz9awram

  • MD5

    14246ea59962956247cb757ff4c485e8

  • SHA1

    41233827e40eacdc99a408d0b0ecfe78ee24120c

  • SHA256

    f89d5db1d93b61d6e6346fa86e914a5b02e927c8eee905e658b0818f76a545ca

  • SHA512

    8dda3374a819f3be57a2793094a77b663af924268e810eb36872e1b308c3faa0bf1dc374d26ad1ce94d6d86a5e958a8bff4b9d647658c0d1265b378857ea1e00

  • SSDEEP

    24576:7uGlcxORH/ZzPIHhHh79f1P7RTpmZl/7kcmsbY:7uOLUhrP7RTYr

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7293224337:AAGQ5dfI8Gbcc9C0VWXufkTkIt2XTgIrMks/sendMessage?chat_id=7727510436

Targets

    • Target

      rDEKONT-1_16_2025__75kb__pdf.exe

    • Size

      912KB

    • MD5

      14246ea59962956247cb757ff4c485e8

    • SHA1

      41233827e40eacdc99a408d0b0ecfe78ee24120c

    • SHA256

      f89d5db1d93b61d6e6346fa86e914a5b02e927c8eee905e658b0818f76a545ca

    • SHA512

      8dda3374a819f3be57a2793094a77b663af924268e810eb36872e1b308c3faa0bf1dc374d26ad1ce94d6d86a5e958a8bff4b9d647658c0d1265b378857ea1e00

    • SSDEEP

      24576:7uGlcxORH/ZzPIHhHh79f1P7RTpmZl/7kcmsbY:7uOLUhrP7RTYr

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks