General

  • Target

    Skramlekassens.exe

  • Size

    1.1MB

  • Sample

    250211-v2rnvstqcr

  • MD5

    35ee6e0d45ac82619b30c88ae3ac40fe

  • SHA1

    ae1c2d10f66c8cc4574643b40fb17d428b868aa5

  • SHA256

    6b11ef45fe61a72300142c891c2855febf4e3bac1b00104cf6dd10e6520a10c8

  • SHA512

    c2631034c0f3136aefae310335b4d41a42cc0be0d5e87e3fd10aaf0a50a9262584a0dbdf6aaeb33322a3d385f373d093613a23a1269b013f180abe3a0f91a093

  • SSDEEP

    24576:/V8oyndYnqJpB7Zj16wbfqiPACOedfHYNXNHA6:/V8BfJphZl/ACOdHA

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7745751910:AAGY46QDCTWO_Pw9iDqZhkNij-i4uwbMgzE/sendMessage?chat_id=7695061973

Targets

    • Target

      Skramlekassens.exe

    • Size

      1.1MB

    • MD5

      35ee6e0d45ac82619b30c88ae3ac40fe

    • SHA1

      ae1c2d10f66c8cc4574643b40fb17d428b868aa5

    • SHA256

      6b11ef45fe61a72300142c891c2855febf4e3bac1b00104cf6dd10e6520a10c8

    • SHA512

      c2631034c0f3136aefae310335b4d41a42cc0be0d5e87e3fd10aaf0a50a9262584a0dbdf6aaeb33322a3d385f373d093613a23a1269b013f180abe3a0f91a093

    • SSDEEP

      24576:/V8oyndYnqJpB7Zj16wbfqiPACOedfHYNXNHA6:/V8BfJphZl/ACOdHA

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      34442e1e0c2870341df55e1b7b3cccdc

    • SHA1

      99b2fa21aead4b6ccd8ff2f6d3d3453a51d9c70c

    • SHA256

      269d232712c86983336badb40b9e55e80052d8389ed095ebf9214964d43b6bb1

    • SHA512

      4a8c57fb12997438b488b862f3fc9dc0f236e07bb47b2bce6053dcb03ac7ad171842f02ac749f02dda4719c681d186330524cd2953d33cb50854844e74b33d51

    • SSDEEP

      192:jPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4I:u7VpNo8gmOyRsVc4

    Score
    8/10
    • Downloads MZ/PE file

MITRE ATT&CK Enterprise v15

Tasks