Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
PO202501A.zip
-
Size
6.9MB
-
Sample
250122-l6wzps1rfj
-
MD5
ed20f5e19ddb0017385a7bca37003fe5
-
SHA1
662c42db572081a5c4520870b33c0ace98a316f9
-
SHA256
372dc76e6d84b69619af43c61f21cb2fa5e0cd5ff8d0025c00858c16854ad077
-
SHA512
c025a3b9bfa0ad789360c101e8cf7ff15d726894a6a04c0bc5685e994ce716c12b7fc436ae57555eec9963f1aa9aa85d7db738e9003fbae2d2d46383a117dd5e
-
SSDEEP
98304:J6bunqIas8R6oPuD1YyaKaNqlhK6CM2yZpePlYmhHLpye+QjmuypsWYkxt2XhoAL:J6anattmeNKaNqlxSyZ8Pm0kQjk8XfL
Static task
static1
Behavioral task
behavioral1
Sample
PO202501A.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO202501A.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
BugSplat64.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
BugSplat64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
PO202501A.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PO202501A.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7328132851:AAGjxJzgHhOy6CKcH2zQWuOPw-Si4v2MtvU/sendMessage?chat_id=7467176655
Targets
-
-
Target
PO202501A.zip
-
Size
6.9MB
-
MD5
ed20f5e19ddb0017385a7bca37003fe5
-
SHA1
662c42db572081a5c4520870b33c0ace98a316f9
-
SHA256
372dc76e6d84b69619af43c61f21cb2fa5e0cd5ff8d0025c00858c16854ad077
-
SHA512
c025a3b9bfa0ad789360c101e8cf7ff15d726894a6a04c0bc5685e994ce716c12b7fc436ae57555eec9963f1aa9aa85d7db738e9003fbae2d2d46383a117dd5e
-
SSDEEP
98304:J6bunqIas8R6oPuD1YyaKaNqlhK6CM2yZpePlYmhHLpye+QjmuypsWYkxt2XhoAL:J6anattmeNKaNqlxSyZ8Pm0kQjk8XfL
Score1/10 -
-
-
Target
BugSplat64.dll
-
Size
14.2MB
-
MD5
946cefc76131918251e84ff417ad4736
-
SHA1
e2f711559b08889426eb22d2ff6756e52c2c719d
-
SHA256
c543557199efbd13ac131a7a4676660bce4ba9d06109af6464d22c44935c86a1
-
SHA512
62cbf241f4d266c3f1952bdcee16e54a0b9dfd4632b7d7cc6befd6d7c94d999349bb26088625bbb08d5d93c9450b5c59dade17b17231c4515d995e8ccbbc17a5
-
SSDEEP
196608:yUt2dD+yDfThRq5mt931hN8clGkkizbqup+d:yUt2t+yDHqq7YriKupA
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
PO202501A.exe
-
Size
255KB
-
MD5
2a39ab7049226dec986fa602a26f5372
-
SHA1
f0baf3b4f1dbcc6dd21e6f1279c741c0051c03cc
-
SHA256
ad4cd780bd7accd7482dcf6222910aafee971c7ab870ebae0022d51b237fa5cb
-
SHA512
5190d06d07b72f8ebaf326b6c0fcd85963afe598be499afee11881905ded944b58829a6ddc85a94f75621e5936496e151a1d8b4b96d12d38148a1f256841dafa
-
SSDEEP
6144:WIaCAK/UGjgTPD/CRe4GvTS8w9hzc9ap+zGj:hz7KmH9tp1
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2