General
-
Target
14c2b4cd9498a9f84526d84ba58e47c7d71a1387f307fa249294930ef1eeae65.tar
-
Size
750KB
-
Sample
250214-cwqkhazla1
-
MD5
045e21092a89e98d779165046108ac2c
-
SHA1
95ae9984d75b057db2e93871a044a1c69235203d
-
SHA256
14c2b4cd9498a9f84526d84ba58e47c7d71a1387f307fa249294930ef1eeae65
-
SHA512
b26a5944b64479b4d1de905f7674d82eb0a02e1824e98b44eb33175c74d7a3c738b8f2bd28de36a6f4313d6936241d1fb44e9dc95ef379dcaa396ddf6d729327
-
SSDEEP
12288:7F9pu9R98DvOx0dy38SeD83S1kAqjxnE8UML789zUO9vVOI0emBm:jpCUqxx3lRsJqjxnlGUOdb0emBm
Static task
static1
Behavioral task
behavioral1
Sample
transferencia_345335.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
transferencia_345335.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250211-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7860252135:AAFnqHLJ-Ng3O61cPpFaVL17gS5Ru2j08qg/sendMessage?chat_id=744079942
Targets
-
-
Target
transferencia_345335.exe
-
Size
742KB
-
MD5
c0fb01b572eb0d863f470df8c93cbb5f
-
SHA1
1f58b684aca32ffc6aa0d2684772bbd72c9aa69c
-
SHA256
2eb79a7bf871a2a679c26d09845996dfeef3af3106d8708a7244bca3000df777
-
SHA512
23a8c1283cd5bde134e08850a8663eb772d94ac31ccdd144ee26b4bde5a4a2d575e056dc96c187a2b2a1763bfe63af229c08fa52916b763033c2369b115df48f
-
SSDEEP
12288:LF9pu9R98DvOx0dy38SeD83S1kAqjxnE8UML789zUO9vVOI0emBmZ:TpCUqxx3lRsJqjxnlGUOdb0emBmZ
-
Guloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
cf85183b87314359488b850f9e97a698
-
SHA1
6b6c790037eec7ebea4d05590359cb4473f19aea
-
SHA256
3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac
-
SHA512
fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b
-
SSDEEP
96:3IsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9oug:YVL7ikJb76BQUoUm+RnyXVYO2RvHoug
Score8/10-
Downloads MZ/PE file
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2