Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    97675879147c218f8fa07cf6df34d9c308f058a511e3197280b8787f38c45073.arj

  • Size

    539KB

  • Sample

    250129-dkx1waypfx

  • MD5

    640c1748bcfb185f4d43de5b7a7eb078

  • SHA1

    ec9f24117a1bd99aef089cc0c0323bd8916424a4

  • SHA256

    97675879147c218f8fa07cf6df34d9c308f058a511e3197280b8787f38c45073

  • SHA512

    c53ec666d80c233868f0e89c184e1b3a3f69f094bc15e4afcdfeb565d77230f9b62ef67fd5f02f8322b247d8753011cb9e24bb3dde7dfa5f5ada9ba21aa881e6

  • SSDEEP

    12288:LkS6ZBlTREbiFrRRsJI6mBpTdR9NIUjIWEd5S5vrGuX:LkS6ZPTNvWinIsIWGSxB

Malware Config

Extracted

Family

vipkeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.vvtrade.vn
  • Port:
    587
  • Username:
    sales-nguyen@vvtrade.vn
  • Password:
    qVyP6qyv6MQCmZJBRs4t
  • Email To:
    saleseuropower@yandex.com
C2

https://api.telegram.org/bot7323823089:AAFBRsTW94zIpSoDS8yfGsotlQLqF2I6TU0/sendMessage?chat_id=5013849544

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.vvtrade.vn
  • Port:
    587
  • Username:
    sales-nguyen@vvtrade.vn
  • Password:
    qVyP6qyv6MQCmZJBRs4t

Targets

    • Target

      HAFEEZ CHEM GROUP CO.LTD.exe

    • Size

      1.0MB

    • MD5

      065898099311d94907e242c9f4a59935

    • SHA1

      f1657569ac07a17a47ce75e9c2ce412ae4531719

    • SHA256

      e824bf026bb0d12fbea0ab8fee5987455d7e4d330a89bb2c477372a84268f29c

    • SHA512

      c4afce88a8bc0c47830b384d83591f5a3c82f608e068f12507654e4c49692a3911ab8e4c56ad4be678c04224298c3cec9b4ef9e7c1f7268994df44c932c01d1f

    • SSDEEP

      24576:oAHnh+eWsN3skA4RV1Hom2KXFmIaLwLPExgFR4G5:vh+ZkldoPK1XaLw5FX

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.