General

  • Target

    1e9a2479f6891293504c3d31b0d4111654d0d9274b8455cfef4178b1f87efcc0

  • Size

    21KB

  • Sample

    250128-kvwdcstmd1

  • MD5

    9a78145d352cfd9de984652bfc3cc092

  • SHA1

    69801fb96d586200559c54d01b345c22cb5e994d

  • SHA256

    1e9a2479f6891293504c3d31b0d4111654d0d9274b8455cfef4178b1f87efcc0

  • SHA512

    9432af2902aa52c912d79598da8f6642d310fd66e9630991aad48d88e7e3eb99d0b4437204f80251d4d29ec4287de97cf62420cb30340641e36d8a85297413d0

  • SSDEEP

    384:Exb2ufIIfpc903GJ8vJjy7u/qZ/YEJm6VRpINxW7EsF6h0Dux:gb2ufIIfDYuSZjZpI+7EKDg

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot8137547477:AAGivMJhPHGxbUXvVQxSLRx55JHHJUPnI3M/sendMessage?chat_id=6680692809

Targets

    • Target

      New list item 830982373737379293873747273494987433PDF.scr

    • Size

      38KB

    • MD5

      ef0ee0495d7cdecbda4c194585446076

    • SHA1

      97e8397350c9e44a72ee441a72ec7f49ce9693bf

    • SHA256

      109c796b316470b61df7a49a0250af8562f130e6365c702ea5559926c1aeacfb

    • SHA512

      c8d955df0cb828139ed10202fca58372ac87bab73f621fb808622126dbd659eeda9867f893703d60d8921c92de6d88f5bb4df89a96ca83fe09168857d3aad0a4

    • SSDEEP

      768:QQ1fBiwnn4Z+8ApjDB6/q6g4gPdQOY2Jd6IrhLzqLV1KjUwRI9M4xM8hvmEjCMA5:QQ1fBiwnnC+npjNcy6VUd3pqLVAjxIox

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks