General

  • Target

    RFQ_5729400129.xll

  • Size

    3KB

  • Sample

    250123-n2lz2syqay

  • MD5

    d1a5639d720b895c6f9bea976788777b

  • SHA1

    0dec9cc7efa216f1088debf0d42c517d1c31f95e

  • SHA256

    65bab37bd3f4aafb41808b286af3e32ab794420c0ed48b880160556e96c0d107

  • SHA512

    7da73d97c4335f164ca9ff2555c905b2782243163f13a4a24f494e2446d6a89a1b6780eae0302b6f332fbd48963b3334f414924ce48e87e478592fc7809b0f40

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bteenerji.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    123husnu

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7002166096:AAGYk1iGM39bnBJfB6xWCZnZold1wr86Vf4/sendMessage?chat_id=7486505413

Targets

    • Target

      RFQ_5729400129.xll

    • Size

      3KB

    • MD5

      d1a5639d720b895c6f9bea976788777b

    • SHA1

      0dec9cc7efa216f1088debf0d42c517d1c31f95e

    • SHA256

      65bab37bd3f4aafb41808b286af3e32ab794420c0ed48b880160556e96c0d107

    • SHA512

      7da73d97c4335f164ca9ff2555c905b2782243163f13a4a24f494e2446d6a89a1b6780eae0302b6f332fbd48963b3334f414924ce48e87e478592fc7809b0f40

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks