General

  • Target

    61198aafe1a7897968ee384fe5fc092e46915bb826019ccb3a18316df4f88025

  • Size

    675KB

  • Sample

    250122-hqz5mstpcw

  • MD5

    138fae2540d15c4d47b7c3212608a8d6

  • SHA1

    ba64a092bfbe0d7aca493a8b96a3980345b2b627

  • SHA256

    61198aafe1a7897968ee384fe5fc092e46915bb826019ccb3a18316df4f88025

  • SHA512

    4d62a2077d67c4222c4d472f9e70bd5a661dc0a1d87a4ce74b2ba75c9e1f983d55701e76d0c74d79d3005fad3c3da502646bd4b7a42408806aa70bbc7a7ff8e2

  • SSDEEP

    12288:FPQhzvfSssY5HADPN+U1iEeaPBZuIqQaH598v/3T1E/W8aiKQXZikXz/PBtYVEKz:FP3i5HArN+UzBuIx/3pEJKQXZiOxCXFB

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7784580930:AAGMCki8hBwu16UwwjATu3X8TvVLB-VhfaE/sendMessage?chat_id=5302361040

Targets

    • Target

      Teklif 99373998749-7638378939.xlsx.exe

    • Size

      775KB

    • MD5

      f253e2c0361fb3ec2fba6a618c024313

    • SHA1

      ffc4e9e16344118eb083734ecb82bf72b23512e8

    • SHA256

      78d1ef46a428169130807621644d3aa5e5c7e214697f25a5b7839fb448b8a4b4

    • SHA512

      db220b586808b7e0af1307da72e946521b8f7740a98c65cf46c4fea56fc4714b619d2861c5c8b4ac96706a6a519774cd276959420b313545231111f21db09477

    • SSDEEP

      12288:uSLKWa+klX1LdS6s+imIloZdt7L23VRYTLWmKtiVBQzHfJ0KVdZe2zbOvlRE42qZ:LkllKV+dNLqVRYPWmB7QVfdDb+l+4JJ

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks