General
-
Target
Justificante transferencia bancaria 097185445.rar
-
Size
723KB
-
Sample
250213-r2zspazlgz
-
MD5
1bacbbcd9e7460310ac468c023a4d8d5
-
SHA1
793995c169e68dbb3f8787ab16c73953de5e28ae
-
SHA256
c58e6e08451b38fcd7db6cb04705fec5cc868676debb5ac0e17760e001533437
-
SHA512
cbd2ff7ecadca2d09ba650ab6f3f69606e353b67252422d36c002c7d2d6afcd19c0348c36cecc32235716dc786f8d84fd7e56320655f313b95e92f86a60f1314
-
SSDEEP
12288:I0zGKA8tQeVZ1xZle/G8yKHNZ8rOeCIP5yLmBoreJppgJd1mcdhbvimVXDGIj:IMntQeVZauDKX8J5T9Szv3EI
Static task
static1
Behavioral task
behavioral1
Sample
Justificante transferencia bancaria 097185445.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Justificante transferencia bancaria 097185445.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250207-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7809339088:AAEUtMa_u0dd_zBfAWh2Ah2az4h6hNs_Wg0/sendMessage?chat_id=7618581100
Targets
-
-
Target
Justificante transferencia bancaria 097185445.exe
-
Size
737KB
-
MD5
df8c4ee84f3897880922002188c2ffd8
-
SHA1
80e151b2aae8383523eabeaafe54dc6b19986eb6
-
SHA256
c3be34851a80788ae23d5ff8659c36711bbfac902dd745bf0f6e30c240578a86
-
SHA512
3960d5372e36dd6c6bb72ea79c8ac5f6964da1a2b5119e68efdf9780d84b408ba8283c3908c8f75b89278f466f991ff5b29b941289575e07a341b56b545b8dd0
-
SSDEEP
12288:yF9S8t23Nm7o/1D220Hy38SeD83S1a37vsQoejUxnE8UML789zUO9vVOI0emBmGu:mS8t3y1DZ3lRsa37kpegxnlGUOdb0emo
-
Guloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
cf85183b87314359488b850f9e97a698
-
SHA1
6b6c790037eec7ebea4d05590359cb4473f19aea
-
SHA256
3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac
-
SHA512
fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b
-
SSDEEP
96:3IsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9oug:YVL7ikJb76BQUoUm+RnyXVYO2RvHoug
Score8/10-
Downloads MZ/PE file
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2