General

  • Target

    8ae6a492bc65fc07707bfc0f43d01604fc234d4d05b5e7e5df3d78bc89a36f3a.exe

  • Size

    1.2MB

  • Sample

    250201-nlyznsskbm

  • MD5

    9de18c615b2177e7c6fb20b1871c0f4a

  • SHA1

    219891d5ecfe28d4240f025558b6643d7ffb602d

  • SHA256

    8ae6a492bc65fc07707bfc0f43d01604fc234d4d05b5e7e5df3d78bc89a36f3a

  • SHA512

    e909ab8f37da41eb3ecf13286bb2836e3e1f4549d3ac42ced2650f5717d5718de2a629b22cee89eb809fc6dc6a59f4dac23afef5ea0350a8dd5f89d9cf3b5870

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaC4hxy+P4m2HrtKtD0HUqM0:7JZoQrbTFZY1iaC4i+eLtKqF

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot8066712820:AAEAb01u8B6eDO5xCMdAz6XCOHC_L2RpVGo/sendMessage?chat_id=7667424178

Targets

    • Target

      8ae6a492bc65fc07707bfc0f43d01604fc234d4d05b5e7e5df3d78bc89a36f3a.exe

    • Size

      1.2MB

    • MD5

      9de18c615b2177e7c6fb20b1871c0f4a

    • SHA1

      219891d5ecfe28d4240f025558b6643d7ffb602d

    • SHA256

      8ae6a492bc65fc07707bfc0f43d01604fc234d4d05b5e7e5df3d78bc89a36f3a

    • SHA512

      e909ab8f37da41eb3ecf13286bb2836e3e1f4549d3ac42ced2650f5717d5718de2a629b22cee89eb809fc6dc6a59f4dac23afef5ea0350a8dd5f89d9cf3b5870

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaC4hxy+P4m2HrtKtD0HUqM0:7JZoQrbTFZY1iaC4i+eLtKqF

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks