General

  • Target

    ebe17d8d5574e603070eb2d958461bb3eb87f54b7b590c1bb86aac0cacff426c.exe

  • Size

    1.0MB

  • Sample

    250131-e8mqgsykhz

  • MD5

    40580338d3b2de78292bc92fb2772978

  • SHA1

    fb24c5013ace3f4a56f0cf5d5a1b29d6cb717994

  • SHA256

    ebe17d8d5574e603070eb2d958461bb3eb87f54b7b590c1bb86aac0cacff426c

  • SHA512

    b6a7c31406ed8a52e52d620a72956d20c50a43ed41af7996825cd5fc09684d46ac0ee379622dbe0ee0fcef4ba9c33d06df4200ab3fbe470c38711478ed193947

  • SSDEEP

    24576:dAHnh+eWsN3skA4RV1Hom2KXFmIaK5AuKH8iF5:8h+ZkldoPK1XaKZKcU

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7965348925:AAGe8wdrvk9A3lxr1GIjGigodJ_zZ7prhfs/sendMessage?chat_id=6848903538

Targets

    • Target

      ebe17d8d5574e603070eb2d958461bb3eb87f54b7b590c1bb86aac0cacff426c.exe

    • Size

      1.0MB

    • MD5

      40580338d3b2de78292bc92fb2772978

    • SHA1

      fb24c5013ace3f4a56f0cf5d5a1b29d6cb717994

    • SHA256

      ebe17d8d5574e603070eb2d958461bb3eb87f54b7b590c1bb86aac0cacff426c

    • SHA512

      b6a7c31406ed8a52e52d620a72956d20c50a43ed41af7996825cd5fc09684d46ac0ee379622dbe0ee0fcef4ba9c33d06df4200ab3fbe470c38711478ed193947

    • SSDEEP

      24576:dAHnh+eWsN3skA4RV1Hom2KXFmIaK5AuKH8iF5:8h+ZkldoPK1XaKZKcU

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks