General
-
Target
c61c89b96eb48eaf6d0646ba040b689201b0a781b625cada062548426ee5c9a5
-
Size
677KB
-
Sample
250122-fbhwpszjeq
-
MD5
12c41c1de108bcca89309ca72b1fe790
-
SHA1
f3467e09c14e5cff98b4fc2d81c6a1184d458442
-
SHA256
c61c89b96eb48eaf6d0646ba040b689201b0a781b625cada062548426ee5c9a5
-
SHA512
ced77da2d68e237b7b6b00d40b38f621f64cca575525a88108a3a30e98e33bfac14892438cf2fe1440bb45f116a38e581f55322f52de4461a1cfa1256578d0bd
-
SSDEEP
12288:CWPhz9kymLBejwXwTmkfwhvXSGeMFkd7SIJBTc32NSTSkiNxYKTyqbZbzI89o3kX:CW4LBD+OhpeYEBcmQFiNiey2ZfIMsYR
Static task
static1
Behavioral task
behavioral1
Sample
RFQ#JST20251127.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
RFQ#JST20251127.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot6172680371:AAGdna-xIKVG_ha6EKkcDxhJez2KjVhI3Pc/sendMessage?chat_id=7427804146
Targets
-
-
Target
RFQ#JST20251127.exe
-
Size
777KB
-
MD5
2a033ce79f8142bc08a4936294f0cac7
-
SHA1
facae4705744a69dae73c1215b93d0c0f68615cb
-
SHA256
662c59e2e25dd110e668d033d78c2becf8c9441becc0f635bae889f9818031a4
-
SHA512
c7de1555c388a0ab61fbe680ff42b828324b865a2093d247c4b937cb12b16bbe767e7cf7bd96cc437b17493ae63aa775de5fe0257aa649622b987193a2215b96
-
SSDEEP
12288:j3L7Wa+k86Rg9IcgMiXBKy83nEiOm8mPaEC8mGo1GAVp2Lr7nE87bGiB:Uk30iRgXE11cRCZGvAVpP87
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2