General

  • Target

    ODEME.01.28.2025(57KB).pdf.exe

  • Size

    823KB

  • Sample

    250128-npfbqsxlet

  • MD5

    08df52a7ad901e5f5ce650684ff6ceef

  • SHA1

    2f794358f6561b2a4e763f0c3056f2f7a1eb6d1b

  • SHA256

    b46763d2b9f60018e00a5f4dc77951787ac58ee8e85973b779b1b01b3056c126

  • SHA512

    049ec2f9b29dbe4427ac7d70637eb397bfc28b19e71f7db6975e6aa8708dd11aa15bc039a04e6ce016814f614a17c6b52dbfc572f5c21c9282b14009098b474c

  • SSDEEP

    12288:HrlY00jXYd1rn1jldZC3ThHVBbIxpOPRAXC4z28O9MWEYD0CCkUWkG2DtKotZtg6:HrldTrR01V9Ie5gCo3BCnDWZKotZy6

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7806539045:AAHS_c4IrL4UyjnLLxTQose6stkMIcfx4yg/sendMessage?chat_id=7727510436

Targets

    • Target

      ODEME.01.28.2025(57KB).pdf.exe

    • Size

      823KB

    • MD5

      08df52a7ad901e5f5ce650684ff6ceef

    • SHA1

      2f794358f6561b2a4e763f0c3056f2f7a1eb6d1b

    • SHA256

      b46763d2b9f60018e00a5f4dc77951787ac58ee8e85973b779b1b01b3056c126

    • SHA512

      049ec2f9b29dbe4427ac7d70637eb397bfc28b19e71f7db6975e6aa8708dd11aa15bc039a04e6ce016814f614a17c6b52dbfc572f5c21c9282b14009098b474c

    • SSDEEP

      12288:HrlY00jXYd1rn1jldZC3ThHVBbIxpOPRAXC4z28O9MWEYD0CCkUWkG2DtKotZtg6:HrldTrR01V9Ie5gCo3BCnDWZKotZy6

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks