General

  • Target

    30012025_1641_29012025_EFT-Remittance_for_Overdue_Invoice.GZ

  • Size

    642KB

  • Sample

    250130-t7fccawqg1

  • MD5

    b5f7d77355f0c0664ffe8732bfe7eeae

  • SHA1

    dc03b7bf272cea0c5f3aa0a97a72d50d9a100848

  • SHA256

    0d53d6f713a2b7f20008c3652da422c6293c63ba3ba72fce0cb526e69d39d57d

  • SHA512

    5bf0c6c2296d9afe90ebf7bfd95963fe7b67297960662e8499a68d3551a8c24e56062986db5ee5c4ce609c3bcbd2c2d709b9e0f88e0867fd9f2426155dfcc979

  • SSDEEP

    12288:nBZjKNvJrLBVN2xa81YzG45UMscbx1gVTn8PIEK+co+lJmp3la418G63TH:n3+NBnNIcG45UT2x1gVTni8+tqJmBNPY

Malware Config

Extracted

Family

vipkeylogger

Targets

    • Target

      EFT-Remittance for Overdue Invoice.exe

    • Size

      1.2MB

    • MD5

      4356632cd55a6b5f7b9f49dc17ccee00

    • SHA1

      174bffb9781b6f4e455bba193a6921f57bc7f079

    • SHA256

      62c6436c72f6e31fe3598b4e79600f6262a5fcce63fe6a780e6644669f2b5e63

    • SHA512

      4db5ddf36fc19e3389f4d2b24d0a4e5cf923a8a43fd57e5b61b5d1522a70215615a58ad5a605b9dbc6f5f112db06b2902bd6fdb0811d322565ecda2fbf6fc382

    • SSDEEP

      24576:RAHnh+eWsN3skA4RV1Hom2KXFmIakcPGVsvv9BcdHy+oOZ7d8N5:oh+ZkldoPK1XakcPGVsnTc9iIpq

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks