General

  • Target

    352ee59f5c656357fb90e96225d9eeb826ce8955eab0bac2663d2d0be6591dce.exe

  • Size

    890KB

  • Sample

    250215-2aenjsxphv

  • MD5

    7bc1c1705c00dcd7be861517f0c2e4f9

  • SHA1

    e7faedfcf25edd1a1def84972c924dfbc3094be6

  • SHA256

    352ee59f5c656357fb90e96225d9eeb826ce8955eab0bac2663d2d0be6591dce

  • SHA512

    d0d736fdda79125c6b6d17d6901f607503da6662ebddefbdb1eb1d9717d928889c69be87e27d179387b24caeecddd4e81909bc3bfa5a2e5628c98313c58ebfe3

  • SSDEEP

    24576:F6g7wwDEGmv9ax8qezKoL9hYThImgvo3dXJ9:FTpDbQYGL92evIlT

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7354418955:AAH10FAR8IByRBtd_Qs69uwN7lnhl-2X18k/sendMessage?chat_id=6851554211

Targets

    • Target

      352ee59f5c656357fb90e96225d9eeb826ce8955eab0bac2663d2d0be6591dce.exe

    • Size

      890KB

    • MD5

      7bc1c1705c00dcd7be861517f0c2e4f9

    • SHA1

      e7faedfcf25edd1a1def84972c924dfbc3094be6

    • SHA256

      352ee59f5c656357fb90e96225d9eeb826ce8955eab0bac2663d2d0be6591dce

    • SHA512

      d0d736fdda79125c6b6d17d6901f607503da6662ebddefbdb1eb1d9717d928889c69be87e27d179387b24caeecddd4e81909bc3bfa5a2e5628c98313c58ebfe3

    • SSDEEP

      24576:F6g7wwDEGmv9ax8qezKoL9hYThImgvo3dXJ9:FTpDbQYGL92evIlT

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks