General

  • Target

    Invoice#2968 (PO#83270) pdf.exe.v

  • Size

    832KB

  • Sample

    250131-fet35sylfw

  • MD5

    2fa6791b73bec4f05a53347a37c0a2e4

  • SHA1

    c5e240318972c79afcb40b8b3cf185cfa523e0ee

  • SHA256

    517c2ec612e5eef224a280a1509a9c646237a0295ab0a26534e362f3dace92e9

  • SHA512

    e6e4d6f4644cd7452551574f5959c86ecdde156412294dc27651b9efbdfb13fccf5031432e3fb0d02a2d64647762bcba13c89573d361c2fdfd40194c2f6d9c9a

  • SSDEEP

    24576:fO6e12gVzguVxwVzN6vET4XvjkFy05e5v+:W912gVsjR0gukkT5v

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot8066712820:AAEAb01u8B6eDO5xCMdAz6XCOHC_L2RpVGo/sendMessage?chat_id=7667424178

Targets

    • Target

      Invoice#2968 (PO#83270) pdf.exe.v

    • Size

      832KB

    • MD5

      2fa6791b73bec4f05a53347a37c0a2e4

    • SHA1

      c5e240318972c79afcb40b8b3cf185cfa523e0ee

    • SHA256

      517c2ec612e5eef224a280a1509a9c646237a0295ab0a26534e362f3dace92e9

    • SHA512

      e6e4d6f4644cd7452551574f5959c86ecdde156412294dc27651b9efbdfb13fccf5031432e3fb0d02a2d64647762bcba13c89573d361c2fdfd40194c2f6d9c9a

    • SSDEEP

      24576:fO6e12gVzguVxwVzN6vET4XvjkFy05e5v+:W912gVsjR0gukkT5v

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks