General

  • Target

    New Order 12960 Inquiry.exe

  • Size

    767KB

  • Sample

    250130-vk48maxlgv

  • MD5

    5c009b0e4bb639e8dd7f5a1921f6d942

  • SHA1

    5af4ef8bf1091d5e85016dbbd860fafd595d464c

  • SHA256

    a8c8535f49c3869518e9d62f95086e5ac36526ea61d4203aa8d2077d33ae9faa

  • SHA512

    064163938ad379c9bd77a38b6f64b127f67b909ae8ddc2cf0d1b88451b04b188bf4e9d47d42f42d4fe3a097dc5e2c31a6a9434a9fb7236fba6f4d7ba67ff5fc3

  • SSDEEP

    12288:VC4sBuaYOTSwX7Ky7AcBC3/FGDetYd4ZMl7DNeNSSHkCO9X:Y4taZTSIpBdeg4ZMppvSE39X

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot8066712820:AAEAb01u8B6eDO5xCMdAz6XCOHC_L2RpVGo/sendMessage?chat_id=7667424178

Targets

    • Target

      New Order 12960 Inquiry.exe

    • Size

      767KB

    • MD5

      5c009b0e4bb639e8dd7f5a1921f6d942

    • SHA1

      5af4ef8bf1091d5e85016dbbd860fafd595d464c

    • SHA256

      a8c8535f49c3869518e9d62f95086e5ac36526ea61d4203aa8d2077d33ae9faa

    • SHA512

      064163938ad379c9bd77a38b6f64b127f67b909ae8ddc2cf0d1b88451b04b188bf4e9d47d42f42d4fe3a097dc5e2c31a6a9434a9fb7236fba6f4d7ba67ff5fc3

    • SSDEEP

      12288:VC4sBuaYOTSwX7Ky7AcBC3/FGDetYd4ZMl7DNeNSSHkCO9X:Y4taZTSIpBdeg4ZMppvSE39X

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks