General

  • Target

    Justificante transferencia bancaria 097185445.rar

  • Size

    723KB

  • Sample

    250213-r2zspazlgz

  • MD5

    1bacbbcd9e7460310ac468c023a4d8d5

  • SHA1

    793995c169e68dbb3f8787ab16c73953de5e28ae

  • SHA256

    c58e6e08451b38fcd7db6cb04705fec5cc868676debb5ac0e17760e001533437

  • SHA512

    cbd2ff7ecadca2d09ba650ab6f3f69606e353b67252422d36c002c7d2d6afcd19c0348c36cecc32235716dc786f8d84fd7e56320655f313b95e92f86a60f1314

  • SSDEEP

    12288:I0zGKA8tQeVZ1xZle/G8yKHNZ8rOeCIP5yLmBoreJppgJd1mcdhbvimVXDGIj:IMntQeVZauDKX8J5T9Szv3EI

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7809339088:AAEUtMa_u0dd_zBfAWh2Ah2az4h6hNs_Wg0/sendMessage?chat_id=7618581100

Targets

    • Target

      Justificante transferencia bancaria 097185445.exe

    • Size

      737KB

    • MD5

      df8c4ee84f3897880922002188c2ffd8

    • SHA1

      80e151b2aae8383523eabeaafe54dc6b19986eb6

    • SHA256

      c3be34851a80788ae23d5ff8659c36711bbfac902dd745bf0f6e30c240578a86

    • SHA512

      3960d5372e36dd6c6bb72ea79c8ac5f6964da1a2b5119e68efdf9780d84b408ba8283c3908c8f75b89278f466f991ff5b29b941289575e07a341b56b545b8dd0

    • SSDEEP

      12288:yF9S8t23Nm7o/1D220Hy38SeD83S1a37vsQoejUxnE8UML789zUO9vVOI0emBmGu:mS8t3y1DZ3lRsa37kpegxnlGUOdb0emo

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      cf85183b87314359488b850f9e97a698

    • SHA1

      6b6c790037eec7ebea4d05590359cb4473f19aea

    • SHA256

      3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac

    • SHA512

      fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b

    • SSDEEP

      96:3IsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9oug:YVL7ikJb76BQUoUm+RnyXVYO2RvHoug

    Score
    8/10
    • Downloads MZ/PE file

MITRE ATT&CK Enterprise v15

Tasks