General

  • Target

    67756ee395555735b7ee279aceedec914a19d6db9359d73647a72cc75440b367.exe

  • Size

    971KB

  • Sample

    250131-ek4n4azpfj

  • MD5

    54d3806599e545f23886b3d6d4f1c669

  • SHA1

    ea8f2ac8e96230c9e88f75d6bf7b17a6f35c244e

  • SHA256

    67756ee395555735b7ee279aceedec914a19d6db9359d73647a72cc75440b367

  • SHA512

    d29a8ba9375127fb5bb26dfdb695f3ac90f60760a51f5070d70c6f208e7ec200ef952215cd28abbe6d9e6d5dc7af1114c85cefeb99ce098719b2462961bb12f1

  • SSDEEP

    24576:cAHnh+eWsN3skA4RV1Hom2KXFmIaxtNP5:7h+ZkldoPK1Xaxtj

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7721085569:AAH1tkciy-nKykIEUNjOAUsItTcvNCVmFLo/sendMessage?chat_id=6236275763

Targets

    • Target

      67756ee395555735b7ee279aceedec914a19d6db9359d73647a72cc75440b367.exe

    • Size

      971KB

    • MD5

      54d3806599e545f23886b3d6d4f1c669

    • SHA1

      ea8f2ac8e96230c9e88f75d6bf7b17a6f35c244e

    • SHA256

      67756ee395555735b7ee279aceedec914a19d6db9359d73647a72cc75440b367

    • SHA512

      d29a8ba9375127fb5bb26dfdb695f3ac90f60760a51f5070d70c6f208e7ec200ef952215cd28abbe6d9e6d5dc7af1114c85cefeb99ce098719b2462961bb12f1

    • SSDEEP

      24576:cAHnh+eWsN3skA4RV1Hom2KXFmIaxtNP5:7h+ZkldoPK1Xaxtj

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks