General

  • Target

    b7ffe514c90485438c522430e88937fa81bc965e74161025eb18f8c1a85275d3.exe

  • Size

    775KB

  • Sample

    250129-dta8gayrez

  • MD5

    ed7f5730d0f9e12ca48d360a28c3ba67

  • SHA1

    f1d3e4b97f03ce3e38237e573b07e87886625b47

  • SHA256

    b7ffe514c90485438c522430e88937fa81bc965e74161025eb18f8c1a85275d3

  • SHA512

    3e8133fd3535d7b5ba868a6419ddcb10caf7bf8b5e8eefaf23e1d952a767fda10e4dbe6807314d7aa8d7537be47be91e0f1a035145f47c345a5fff4b9c745d7f

  • SSDEEP

    24576:lkpOJ2C+lQqI5uBI5DQX0VTzbYbJFv5FZIu:lSOHkQqI5uBGq0VTSTZ

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk/sendMessage?chat_id=7319393351

Targets

    • Target

      b7ffe514c90485438c522430e88937fa81bc965e74161025eb18f8c1a85275d3.exe

    • Size

      775KB

    • MD5

      ed7f5730d0f9e12ca48d360a28c3ba67

    • SHA1

      f1d3e4b97f03ce3e38237e573b07e87886625b47

    • SHA256

      b7ffe514c90485438c522430e88937fa81bc965e74161025eb18f8c1a85275d3

    • SHA512

      3e8133fd3535d7b5ba868a6419ddcb10caf7bf8b5e8eefaf23e1d952a767fda10e4dbe6807314d7aa8d7537be47be91e0f1a035145f47c345a5fff4b9c745d7f

    • SSDEEP

      24576:lkpOJ2C+lQqI5uBI5DQX0VTzbYbJFv5FZIu:lSOHkQqI5uBGq0VTSTZ

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks