General
-
Target
04022025_1555_03022025_Factura 1-000020.7z
-
Size
529KB
-
Sample
250204-tc816s1jft
-
MD5
8440a0d78fe2323c85c052ba1ee3fd1b
-
SHA1
5fa76bde3d55594371aa58dc325e9c78a192717c
-
SHA256
6e2d39aa99847f4450506afe26b79964aff495181a8e8cf09a7220c6e8d89c0c
-
SHA512
1499d9d1cd58f71b74668424ec28ed143889e391d3777586c7041e141a6a6b2abf95dfcbe9532fa60f3db123e184c7b9ffd663d1a77dfa961858f95671932208
-
SSDEEP
12288:Royrl5gh9eUi8r+l4/F13Krnmfv0HrvXXqWOKF47d:6yp5WIW+qX3MWMeMFsd
Static task
static1
Behavioral task
behavioral1
Sample
Factura 1-000020.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Factura 1-000020.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7773098790:AAEE5JLRU6ZmFmj9gIQj7Pc9-3yLSS6W5fs/sendMessage?chat_id=5434550993
Targets
-
-
Target
Factura 1-000020.exe
-
Size
648KB
-
MD5
9d6708323900f452f54e1686d0f6a51e
-
SHA1
9edad44fedccef9d611a7257bb03e6f9aeecb33b
-
SHA256
6818ec6de5edc2758e82824c374b5c3642d52e855e6f55db945d8245662f4307
-
SHA512
5ab111c4585052029a035bcc1133fecf24f7dd3b7d1b8cdd03cf9d7ec131326013adde166580bffc280b38dae288de2c95e17fbc4c65c7ce5518bfe31d59723c
-
SSDEEP
12288:Cgum6gVzk8JwoqcjwQ2GnvTfAebpHmohC6oN4XAWTwj41jU:BVo8xqcMQ2GvTfAebzhC74XAjN
-
Guloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/LangDLL.dll
-
Size
5KB
-
MD5
0c44f21d4afc81cc99fac7cc35e4503a
-
SHA1
3d0d5c684df99a46510c0e2c0020163a9d11c08d
-
SHA256
8dc2be6679497994e3ddc97bc7bc1ce2b3c17ef3528b03ded6696ef198a11d10
-
SHA512
4e4bd35d6aa21cecbfe7a93a2ee7db8ee78ca710a4193dfe240d1067afbe10f61db332c1c85f6cc3ba404d895a959742401b615ef8ff5bd9028254c4a43a0923
-
SSDEEP
48:S46+/N3TKYKxbWsptIpBtWZ0iV8jAWiAJCvxft2O2B8mCofjLl:zPuPbOBtWZBV8jAWiAJCdv2CmpL
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
a4dd044bcd94e9b3370ccf095b31f896
-
SHA1
17c78201323ab2095bc53184aa8267c9187d5173
-
SHA256
2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
-
SHA512
87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
SSDEEP
192:em24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlESl:m8QIl975eXqlWBrz7YLOlE
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2