General

  • Target

    JUSTIF. PAGO AQUISGRANpdf.tar

  • Size

    1.2MB

  • Sample

    250211-sstqraymgp

  • MD5

    2df86e9befbbcf075b271a456f30c348

  • SHA1

    bdb6b54c81c03eedae6857e6fdd9057df6a14a86

  • SHA256

    2c18a3af7a45f3b6c0bf641a4e0518bcffad89915f16fc1e217aca2349640287

  • SHA512

    8c9f8ce64f2da496b6b58c9e33ce5fc96dc9fe1f6e8043bf74ce283af5f3b6240c52a80f1e1c5a2b6ded950bbdbc83b9a3c93788bddb9a965d8784290bcccb66

  • SSDEEP

    24576:YPte6p+SwiWl+GNraWrzAk2LIP4ylsjM3NVzyYTjM5v:7SwpNrf4k2o4RjMXDTjM5v

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7593476266:AAE6M295mE9PbPkQ7CR5WSujMoIZWK3jwKo/sendMessage?chat_id=6104927734

Targets

    • Target

      JUSTIF. PAGO AQUISGRANpdf.exe

    • Size

      1.2MB

    • MD5

      2535cc454af795347095870ca9ce8813

    • SHA1

      cb57530e8c7728a65a6e1d5bb02bc60cd34e2acc

    • SHA256

      b81941d461376eb31e9d7a8a32223eb7f75064ea44069da96ea673ca189c3009

    • SHA512

      c8940abf74bc6a8650299ec57afb152e6956515cf4468f7702f253c6818b20d49bb1a87b1088bdce9f9b7e27d48badeea1de894383cf4ec0bb37d5f4e302a286

    • SSDEEP

      24576:rPte6p+SwiWl+GNraWrzAk2LIP4ylsjM3NVzyYTjM5v:OSwpNrf4k2o4RjMXDTjM5v

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      cf85183b87314359488b850f9e97a698

    • SHA1

      6b6c790037eec7ebea4d05590359cb4473f19aea

    • SHA256

      3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac

    • SHA512

      fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b

    • SSDEEP

      96:3IsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9oug:YVL7ikJb76BQUoUm+RnyXVYO2RvHoug

    Score
    8/10
    • Downloads MZ/PE file

MITRE ATT&CK Enterprise v15

Tasks