General

  • Target

    b6da93489b265943cd505e8908005bf8e9eab517b8f6a34b69f48abd017ebc9e.exe

  • Size

    1.1MB

  • Sample

    250213-gx1jbatpck

  • MD5

    16c46225160a17b848d85ff6d7c3d97a

  • SHA1

    9dc430053ce9fef9d8aad28bb09e8e79d46b4c2c

  • SHA256

    b6da93489b265943cd505e8908005bf8e9eab517b8f6a34b69f48abd017ebc9e

  • SHA512

    e8665a6b1e73a83ec35dc701507fd2b31efc266021d025f59d0f9c5ec96f9dec76cc1e2e12f78d2316a476fb6d7ad6e26c993bcbdd3c32882f92e66c7cd58dd6

  • SSDEEP

    24576:yV8oc/4DiOZ3gZ2wbfqiPACOedfHYNXNHA6b:yV8MuOZuj/ACOdHAM

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7745751910:AAGY46QDCTWO_Pw9iDqZhkNij-i4uwbMgzE/sendMessage?chat_id=7695061973

Targets

    • Target

      b6da93489b265943cd505e8908005bf8e9eab517b8f6a34b69f48abd017ebc9e.exe

    • Size

      1.1MB

    • MD5

      16c46225160a17b848d85ff6d7c3d97a

    • SHA1

      9dc430053ce9fef9d8aad28bb09e8e79d46b4c2c

    • SHA256

      b6da93489b265943cd505e8908005bf8e9eab517b8f6a34b69f48abd017ebc9e

    • SHA512

      e8665a6b1e73a83ec35dc701507fd2b31efc266021d025f59d0f9c5ec96f9dec76cc1e2e12f78d2316a476fb6d7ad6e26c993bcbdd3c32882f92e66c7cd58dd6

    • SSDEEP

      24576:yV8oc/4DiOZ3gZ2wbfqiPACOedfHYNXNHA6b:yV8MuOZuj/ACOdHAM

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      34442e1e0c2870341df55e1b7b3cccdc

    • SHA1

      99b2fa21aead4b6ccd8ff2f6d3d3453a51d9c70c

    • SHA256

      269d232712c86983336badb40b9e55e80052d8389ed095ebf9214964d43b6bb1

    • SHA512

      4a8c57fb12997438b488b862f3fc9dc0f236e07bb47b2bce6053dcb03ac7ad171842f02ac749f02dda4719c681d186330524cd2953d33cb50854844e74b33d51

    • SSDEEP

      192:jPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4I:u7VpNo8gmOyRsVc4

    Score
    8/10
    • Downloads MZ/PE file

MITRE ATT&CK Enterprise v15

Tasks