General

  • Target

    42781336b34e19cf5ef16046cbf56ab7ba0370f89343121c63cda774a40d3c2e

  • Size

    9KB

  • Sample

    250130-yqhhla1mg1

  • MD5

    106cb2c2aceee1ec919b068ae22057a2

  • SHA1

    3272ec6f158164238ae008747ce06d8dfb4f9112

  • SHA256

    42781336b34e19cf5ef16046cbf56ab7ba0370f89343121c63cda774a40d3c2e

  • SHA512

    b9e7a0439d800d2df0306f3387fecb69217867b9f114d8075c4ac903003df8727a2cc8a603db43ba0eeb9f68d679deaf4844e2bddb6e01cf4daf8ba08edf1f04

  • SSDEEP

    192:YHFiRuRTGUPqkYZt/3MzkDYG32EqMyuTOgvZHd6INzBFee4jSEA7DHfV:89T4DIuYG32EAuT9xdpVF5zPHfV

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot8181099166:AAHWiTz10g_-_BPRNk3yroxe3fl_IXTpU7s/sendMessage?chat_id=6250686237

Targets

    • Target

      Comprobante de pago__pdf.exe

    • Size

      19KB

    • MD5

      4dcee6e4f297d24fad9454f56d9ee269

    • SHA1

      dbf96d22cdfec813decbac5d54c07f3f20f543c8

    • SHA256

      9aeacaff1f4ad8fa2b5c74318e05fce3827b3ab5cf7f54e286b43af5208c7140

    • SHA512

      00c1794c2cd389d5300f220915999945cb76f50f401ed85594096c328e9fa95460520dc856bfdd064cc200878cc00c0470bf59789fda3bc7af835ded300ecd0b

    • SSDEEP

      384:054nPRWVb6+m9M6qYuJY7te5ixNQfQxk1CxCvwN8:3JX+n6G/jDXvwN8

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks