General
-
Target
6b11ef45fe61a72300142c891c2855febf4e3bac1b00104cf6dd10e6520a10c8.zip
-
Size
1019KB
-
Sample
250211-wla7lsvlem
-
MD5
e8004020a29d8e552f815e3a2906b691
-
SHA1
7cc0e46d7e04aff8dd9e03b7c83c837a23c7cc65
-
SHA256
26d660c77b9a20135f884a2cbf2b26b3df22c2746f7b605fb8c0b08dc12a48af
-
SHA512
2e017b4325f72aa2a4ccfd76a605f61984463038f9b1809619aada63962dc84e3cf23f4fdfd0ccd80e8e50eb9187067096beadc37ba581b911ee0f765883e132
-
SSDEEP
24576:SP1QiSAohLOfv6n+0QRtbXf1uN1XYdBwzieWvOkwJMG:mQfA2Lav6n+hBXfsNtYbpaF
Static task
static1
Behavioral task
behavioral1
Sample
6b11ef45fe61a72300142c891c2855febf4e3bac1b00104cf6dd10e6520a10c8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6b11ef45fe61a72300142c891c2855febf4e3bac1b00104cf6dd10e6520a10c8.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250211-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7745751910:AAGY46QDCTWO_Pw9iDqZhkNij-i4uwbMgzE/sendMessage?chat_id=7695061973
Targets
-
-
Target
6b11ef45fe61a72300142c891c2855febf4e3bac1b00104cf6dd10e6520a10c8.exe
-
Size
1.1MB
-
MD5
35ee6e0d45ac82619b30c88ae3ac40fe
-
SHA1
ae1c2d10f66c8cc4574643b40fb17d428b868aa5
-
SHA256
6b11ef45fe61a72300142c891c2855febf4e3bac1b00104cf6dd10e6520a10c8
-
SHA512
c2631034c0f3136aefae310335b4d41a42cc0be0d5e87e3fd10aaf0a50a9262584a0dbdf6aaeb33322a3d385f373d093613a23a1269b013f180abe3a0f91a093
-
SSDEEP
24576:/V8oyndYnqJpB7Zj16wbfqiPACOedfHYNXNHA6:/V8BfJphZl/ACOdHA
-
Guloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
34442e1e0c2870341df55e1b7b3cccdc
-
SHA1
99b2fa21aead4b6ccd8ff2f6d3d3453a51d9c70c
-
SHA256
269d232712c86983336badb40b9e55e80052d8389ed095ebf9214964d43b6bb1
-
SHA512
4a8c57fb12997438b488b862f3fc9dc0f236e07bb47b2bce6053dcb03ac7ad171842f02ac749f02dda4719c681d186330524cd2953d33cb50854844e74b33d51
-
SSDEEP
192:jPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4I:u7VpNo8gmOyRsVc4
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2