General

  • Target

    03022025_0548_30012025_PO211436forWeatherbeetaNewZealand.rar

  • Size

    510KB

  • Sample

    250203-gr18navjan

  • MD5

    8260a897b2b9ee42fc22a4a8a91948fc

  • SHA1

    b8be056b3639dce109808550e5f4752c898b323d

  • SHA256

    a508afb1d75c464841e10672b80e193178cc1f171ff881c04652bc4a682f4e0d

  • SHA512

    afb096998703e1c33daccf16a35c07eb7a5cdeee6f2c6aa4ab6c0a5af6e836e9c4f1e9c3dcb83b3ae09f418e8c8df602b9f985b02fc92508c43c7a0b207eceb5

  • SSDEEP

    12288:Dpp/GS1HTvFfTbylIbNlI0PBIIXLtBIPiaGM6heen:rbFfTGlsO6BpBBjaz6heen

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot8066712820:AAEAb01u8B6eDO5xCMdAz6XCOHC_L2RpVGo/sendMessage?chat_id=7667424178

Targets

    • Target

      PO 211436 for Weatherbeeta New Zealand.exe

    • Size

      1001KB

    • MD5

      99963fd74eb3b75b40ef8f9360502df3

    • SHA1

      23771514f5868582d100a40ea9bfa3e4c7cea6e5

    • SHA256

      05f64343ff8a947fb28a7bbaca3f236c5995079856428c62573a4ba7832905a6

    • SHA512

      83c7fa950dbfbd2c9509e533a775b606f2d663b1982ce25981ef9459691cb8ca8db6c35ee491f468f2dbbe42ceaedd2930ded9bf1793d2ef74879cbee94808b1

    • SSDEEP

      24576:FAHnh+eWsN3skA4RV1Hom2KXFmIauTfKxWbZA5:0h+ZkldoPK1XauzKQ8

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks