General
-
Target
238c5cbef190c60b37e7d266159aabca.ace
-
Size
1014KB
-
Sample
250212-rp4wwavnfk
-
MD5
238c5cbef190c60b37e7d266159aabca
-
SHA1
c980842dc3c06fa0920a06b0fbbc55b066f510eb
-
SHA256
0757e2d1427c9baeefa1ec3aff84a4e6d862259c84ace769726c66192858f196
-
SHA512
f0f8dc9a1d3c87100e0d1b2a361583f0395afcd70bbcd315c317301a519c679fc77677b4ccba9869144a81eef121a1690f73317b70861b3aff7730a0d23ccabc
-
SSDEEP
24576:2rb/eICiNaRZ6XWAcmZlmSTSO3y59q7pQPxrV:Qy1gaal9T1W7JV
Static task
static1
Behavioral task
behavioral1
Sample
Justificante.ex.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Justificante.ex.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250207-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot8119135929:AAGv_owQnXugQZM3K0TRex_pZFatMkYkfzY/sendMessage?chat_id=6838630391
Targets
-
-
Target
Justificante.ex.exe
-
Size
1.1MB
-
MD5
4a896da2e79d9647adb4b9c7518d6a71
-
SHA1
9569a9066aa22c7c0f7ab7de13e0901ebba2acb9
-
SHA256
f223fc784ed382188a3cd4ffe1d6a641617e0738fc9e018680f739d982ae502d
-
SHA512
3613beba76753955c4b0c165a7d3d82538cb5888470ea5e3dfbe9f412ec5238cc8f67ce477af96fd572344e026c25ef7f298e82e51837bd3f1cfc41a4e1c5405
-
SSDEEP
24576:RV8oce+0nvEKaxHoioqmEwbfqiPACOedfHYNXNHA6u:RV8xjevTsIqa/ACOdHA/
-
Guloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
34442e1e0c2870341df55e1b7b3cccdc
-
SHA1
99b2fa21aead4b6ccd8ff2f6d3d3453a51d9c70c
-
SHA256
269d232712c86983336badb40b9e55e80052d8389ed095ebf9214964d43b6bb1
-
SHA512
4a8c57fb12997438b488b862f3fc9dc0f236e07bb47b2bce6053dcb03ac7ad171842f02ac749f02dda4719c681d186330524cd2953d33cb50854844e74b33d51
-
SSDEEP
192:jPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4I:u7VpNo8gmOyRsVc4
Score8/10-
Downloads MZ/PE file
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2