General

  • Target

    Order_E0147-1-T1911 Re.exe

  • Size

    877KB

  • Sample

    250214-hjpekawpdy

  • MD5

    db311a1841fada64279d58d4e4d40369

  • SHA1

    b91af00e711170098af4f79ea39a864c8628bdaa

  • SHA256

    6b5a7dcaa537f98a500960b08ce7c1cf699b48148741a33d3f17bfdf3de6387c

  • SHA512

    18cfcf012e5b4b45292e9e9cf0fc68c37b25aa2e0e00df5593a152194b95ce9d3007213ba95c20eda396ecaab0a205cfeb7a17791600c08093c04a4bd594a9c2

  • SSDEEP

    12288:lV58rc7EL3Nt4yKckp+OLN8VcVGQsNSDTwn/FQmo2XycEnd4T8Ve0akXLnJ4R2Gx:lV0cgsRVjuSTA+d4T8l7+24+FB

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7354418955:AAH10FAR8IByRBtd_Qs69uwN7lnhl-2X18k/sendMessage?chat_id=6851554211

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bteenerji.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    123husnu

Targets

    • Target

      Order_E0147-1-T1911 Re.exe

    • Size

      877KB

    • MD5

      db311a1841fada64279d58d4e4d40369

    • SHA1

      b91af00e711170098af4f79ea39a864c8628bdaa

    • SHA256

      6b5a7dcaa537f98a500960b08ce7c1cf699b48148741a33d3f17bfdf3de6387c

    • SHA512

      18cfcf012e5b4b45292e9e9cf0fc68c37b25aa2e0e00df5593a152194b95ce9d3007213ba95c20eda396ecaab0a205cfeb7a17791600c08093c04a4bd594a9c2

    • SSDEEP

      12288:lV58rc7EL3Nt4yKckp+OLN8VcVGQsNSDTwn/FQmo2XycEnd4T8Ve0akXLnJ4R2Gx:lV0cgsRVjuSTA+d4T8l7+24+FB

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks