General
-
Target
22012025_0644_22012025_20250103141459859.pdf_______________________________________________________________________________________________________.bz2
-
Size
675KB
-
Sample
250122-hm5wqatmhw
-
MD5
03c689f84f9e1c62509e4e12f31ad84a
-
SHA1
2ca7ce47719eaba3daa39970367657796bbc7051
-
SHA256
b02ab25d291878640e375e08c0ae8c4891410886d560a562cadde4f549b4cedb
-
SHA512
4844aff68ce9192c878489dc27a12f34ddaa4719d387363396dfe0f2bb605a0bd7c97b7e0de4bb6bd965fad06cb30180aca55a3e79f9b71ae6516b65183583d8
-
SSDEEP
12288:QVPgEbiXxQMw1yQeuoAP04kNMUZwYJerwPpX318mA6zIASESS7lmlV4K:A+hvw1yLam1yUr8m185imMK
Static task
static1
Behavioral task
behavioral1
Sample
20250103141459859.pdf_______________________________________________________________________________________________________.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
20250103141459859.pdf_______________________________________________________________________________________________________.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7784580930:AAGMCki8hBwu16UwwjATu3X8TvVLB-VhfaE/sendMessage?chat_id=5302361040
Targets
-
-
Target
20250103141459859.pdf_______________________________________________________________________________________________________.exe
-
Size
775KB
-
MD5
7c14dc5ef95870c931fcf8f09c96e888
-
SHA1
35c351c8fb09dc1c5b799e125ab415106c28114c
-
SHA256
d6168f5b1dbb8cd348064262e9f91f0d41d9f49e417d2ac13dc7de58c7d92968
-
SHA512
43291be4ce5a26d137a6e2729532a55ae12414d09163ca6eea503381b9c523a41c041e511e6081323e1360b364e99103a5b82cce3fc2dea6f1b92d6172d92881
-
SSDEEP
12288:JaLvWa+kbJSanAJ4fESIlpQrB9qpKUV0i/HnlYtk7ZnWU7WWFZLubgL3d6NlDXZr:/kmJ+4crB9g0GnTWUaWFJ7dOpXAO
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2