General

  • Target

    8965a7e50b4c0b43360f8728b20bfa2e303f402790c811aa42c20d4c31a7e621

  • Size

    686KB

  • Sample

    250131-pz2s6awkdx

  • MD5

    1f46933b89557c83b000313f863ed256

  • SHA1

    d78b9e29ddfd4dad4eb8eb19f5dc57a4518c06c6

  • SHA256

    8965a7e50b4c0b43360f8728b20bfa2e303f402790c811aa42c20d4c31a7e621

  • SHA512

    83f77e0f31231f6b5989c35dc71c94c48e641aa99dd8a48521a3bcaf3451a94c7b62700e3d35a83811c08526a42aad47cf57625c87104e12055f7ed6ba38694b

  • SSDEEP

    12288:XNdmhWq8wFwRR8oYrE0mAfrzE0sxZdlV9crEbdj29H+c9nH8AW2H2a87pM43m4+:bXq8XRPOE0HrqxZ/VnZj29eyH/HwdMGa

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot8066712820:AAEAb01u8B6eDO5xCMdAz6XCOHC_L2RpVGo/sendMessage?chat_id=7667424178

Targets

    • Target

      payment_details.pif

    • Size

      768KB

    • MD5

      e3c8136549257eecd2cd0a177c8af4fd

    • SHA1

      e931ba3bd3adcd50a9bc6822f47ce77abaee66aa

    • SHA256

      1feae0629737f66256705d4b358b5ec4f78ad14c5dc196ed3ab0cba5b027c253

    • SHA512

      3376778fe74e6e0e47bb3c7256521ef56568b718bbb8f6507352048a23a09c084f5dc8db46bda8fdfef2653d8140444836cdc1a6759274d4e67576f50d1b11e4

    • SSDEEP

      12288:kpNJyRUoYFComA1rzk+svZdbV9MXEb9Bc9H0Wm+HIAW6pehdhMA:CNJyR3KCorruvZZVpxBc9Uf+HVpceA

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks