General
-
Target
14022025_0938_13022025_Q-M20251302.ace
-
Size
724KB
-
Sample
250214-lmgqns1qbn
-
MD5
802b9027a7156290dbe30dbd9170b82d
-
SHA1
797afa9ab62ca873d252a7c45e7884d40631e8a7
-
SHA256
1950f8acdf1f9e915b5bcce38bdf28985ac1370d899a2ae3f8fcd7afa2fcb829
-
SHA512
adc33129d5d04e8433e04d36de69294740d8e65323cbc174846461a6acb5efacadd33ccd79d35c6785c9e9aeab0f66e967f48ae0ba07b832f087bd3f5a6ad022
-
SSDEEP
12288:hAt8rWYBYLyrzAqqjt/jkA6ZcJnzQrUtOY1AsrzDxNROZ+P3lVmaGIw/bwL302:qYW7ocqqjwSdDt3WsrzDhOEf3oI8Ak2
Static task
static1
Behavioral task
behavioral1
Sample
Q-M20251302.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Q-M20251302.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250211-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7882249709:AAFvt51RgWj7pWTdMoxXSMdKbIgjZVh2YgY/sendMessage?chat_id=7972230855
Targets
-
-
Target
Q-M20251302.exe
-
Size
737KB
-
MD5
4b790bfe7b7c165fb567d17b7fcd9348
-
SHA1
6313514ffe723ddbca6fb4caa3fda967a13f309b
-
SHA256
0a55167fd6274ab545220243dcf2122a91c822e056859fbc9f617d7dbd2dfbb5
-
SHA512
fa4faec78a5f327758aedec821f7b8120906696446aa2291d52beb15ad2dc89abd4e9e31def11e49b4c39e2b03ffe4626ed721d1eedfb87cbcb41a853dee2729
-
SSDEEP
12288:oF9ULOvBp5dYTAJpaE223R8Scy38SeD83S1nVCD1xnE8UML789zUO9vVOI0emBmv:A/vnXQop9uS13lRsnkpxnlGUOdb0emBy
-
Guloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
cf85183b87314359488b850f9e97a698
-
SHA1
6b6c790037eec7ebea4d05590359cb4473f19aea
-
SHA256
3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac
-
SHA512
fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b
-
SSDEEP
96:3IsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9oug:YVL7ikJb76BQUoUm+RnyXVYO2RvHoug
Score8/10-
Downloads MZ/PE file
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2