General

  • Target

    72fa904d41cfc7c04d3c095e84449aecb989cc98b1d008b3ce9b51717173b053.exe

  • Size

    713KB

  • Sample

    250122-c8ec1avlcn

  • MD5

    5006219231a8cb74552d0ad9c1b02ae9

  • SHA1

    1b54149f1d9c54d370c37fc00ad2e28642059c74

  • SHA256

    72fa904d41cfc7c04d3c095e84449aecb989cc98b1d008b3ce9b51717173b053

  • SHA512

    3a71ab78c5ad20325752a4e25267ba086e845cbbdd0452c138a9ac2367f7f5c181d9d1e2019307b4687a170b5ca212559ebe06c44fa43289ba8cdcfaef6a8a0d

  • SSDEEP

    12288:IPHkO6/ceaCdAA3w9zyaZyKgrwoyIgXCYAMA7Q:IPHkOXgAj9zVZgZDd7Q

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7965348925:AAGe8wdrvk9A3lxr1GIjGigodJ_zZ7prhfs/sendMessage?chat_id=6848903538

Targets

    • Target

      72fa904d41cfc7c04d3c095e84449aecb989cc98b1d008b3ce9b51717173b053.exe

    • Size

      713KB

    • MD5

      5006219231a8cb74552d0ad9c1b02ae9

    • SHA1

      1b54149f1d9c54d370c37fc00ad2e28642059c74

    • SHA256

      72fa904d41cfc7c04d3c095e84449aecb989cc98b1d008b3ce9b51717173b053

    • SHA512

      3a71ab78c5ad20325752a4e25267ba086e845cbbdd0452c138a9ac2367f7f5c181d9d1e2019307b4687a170b5ca212559ebe06c44fa43289ba8cdcfaef6a8a0d

    • SSDEEP

      12288:IPHkO6/ceaCdAA3w9zyaZyKgrwoyIgXCYAMA7Q:IPHkOXgAj9zVZgZDd7Q

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks