General

  • Target

    dekont (37KB).pdf.exe

  • Size

    892KB

  • Sample

    250129-l2haravmcs

  • MD5

    57134916752790943db9c4d3c0488e92

  • SHA1

    7cde5ad5b7b11716534bf07e6a54178d841b4c49

  • SHA256

    16a43aa836bfc334a9c67a4a6cbd25aa461b9332b7dbc5271afd75119c2a3521

  • SHA512

    5f2be54e45aa06de736ee66c0552fd6e222038c5aa949188f96b03a18808f06221adf1bbdf68d94f76b76eecbdaad4e1a4fdb3434a029a476469c5e3a7063e8c

  • SSDEEP

    24576:PznY32CV1u6juwCfDG8wA/8I1AGKBXVfW:TCnu6ufDGRWVXeVfW

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7631349628:AAFSmXk7lMPXMwRbmU6LXeGJnXqJ_81KAc8/sendMessage?chat_id=7727510436

Targets

    • Target

      dekont (37KB).pdf.exe

    • Size

      892KB

    • MD5

      57134916752790943db9c4d3c0488e92

    • SHA1

      7cde5ad5b7b11716534bf07e6a54178d841b4c49

    • SHA256

      16a43aa836bfc334a9c67a4a6cbd25aa461b9332b7dbc5271afd75119c2a3521

    • SHA512

      5f2be54e45aa06de736ee66c0552fd6e222038c5aa949188f96b03a18808f06221adf1bbdf68d94f76b76eecbdaad4e1a4fdb3434a029a476469c5e3a7063e8c

    • SSDEEP

      24576:PznY32CV1u6juwCfDG8wA/8I1AGKBXVfW:TCnu6ufDGRWVXeVfW

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks