General
-
Target
fff3bee11214f2b7b70f2d35b3669ad7140f2c9fb08e5e6c8161b0371ede9c96
-
Size
682KB
-
Sample
250116-nyzrqsyncx
-
MD5
8e2fb402659cfd3625d5e13576baa683
-
SHA1
4917e28611eeb062b967fc3c29db6846af7665bb
-
SHA256
fff3bee11214f2b7b70f2d35b3669ad7140f2c9fb08e5e6c8161b0371ede9c96
-
SHA512
5c37db3843c89a45757f465f8a796ce746a2b63ce27d575a024b985886aef342f476344fb48db7befbb2a15bc5dc5d9180cc3f589da1fe38500a04faca933ee1
-
SSDEEP
12288:ucLjbSQXBLE5OHNGBZUh8dZtNqaCyddVSEWj87GPx2+nuu7Q2+t9wW/2:ueFftAUh8d/NTC+zSFP977Q2+t/2
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7773122470:AAHiC5UHGBaPGR4YIPW_XvO3jPCGyJL-2K8/sendMessage?chat_id=5925423018
Targets
-
-
Target
PO.exe
-
Size
744KB
-
MD5
3517733f27d8ee4cedc0987a778a1096
-
SHA1
3406683fdd6e84793e51d107867e3610585918ed
-
SHA256
f22de3de80368de8d284384fdabf68546097f6d5429ffdfe26f51d4b7b76dd8d
-
SHA512
f3ec13547ec6f22e1c2a19b7f7f28db2fcb24214cecc36441ceba6ab46b7432752ec118d60a5db5735afb1d218b56ab359158459ec304ff8d5402da0aa7b5d18
-
SSDEEP
12288:yiYRxA4Y5lyA/BxSPCzubE5G556BpUheDnLKuRSfzSrVMESf87Obz6Sruo7zNs/v:CRrtLKUheDDRq0MVbtl7ps/
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2