General

  • Target

    22012025_0644_22012025_20250103141459859.pdf_______________________________________________________________________________________________________.bz2

  • Size

    675KB

  • Sample

    250122-hm5wqatmhw

  • MD5

    03c689f84f9e1c62509e4e12f31ad84a

  • SHA1

    2ca7ce47719eaba3daa39970367657796bbc7051

  • SHA256

    b02ab25d291878640e375e08c0ae8c4891410886d560a562cadde4f549b4cedb

  • SHA512

    4844aff68ce9192c878489dc27a12f34ddaa4719d387363396dfe0f2bb605a0bd7c97b7e0de4bb6bd965fad06cb30180aca55a3e79f9b71ae6516b65183583d8

  • SSDEEP

    12288:QVPgEbiXxQMw1yQeuoAP04kNMUZwYJerwPpX318mA6zIASESS7lmlV4K:A+hvw1yLam1yUr8m185imMK

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7784580930:AAGMCki8hBwu16UwwjATu3X8TvVLB-VhfaE/sendMessage?chat_id=5302361040

Targets

    • Target

      20250103141459859.pdf_______________________________________________________________________________________________________.exe

    • Size

      775KB

    • MD5

      7c14dc5ef95870c931fcf8f09c96e888

    • SHA1

      35c351c8fb09dc1c5b799e125ab415106c28114c

    • SHA256

      d6168f5b1dbb8cd348064262e9f91f0d41d9f49e417d2ac13dc7de58c7d92968

    • SHA512

      43291be4ce5a26d137a6e2729532a55ae12414d09163ca6eea503381b9c523a41c041e511e6081323e1360b364e99103a5b82cce3fc2dea6f1b92d6172d92881

    • SSDEEP

      12288:JaLvWa+kbJSanAJ4fESIlpQrB9qpKUV0i/HnlYtk7ZnWU7WWFZLubgL3d6NlDXZr:/kmJ+4crB9g0GnTWUaWFJ7dOpXAO

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks