General

  • Target

    1c015ce771fcaf5114418dda8f33c9d357e64de65c2ad89ba2088883a67af9b6.exe

  • Size

    1.1MB

  • Sample

    250215-c4bfjstkhw

  • MD5

    40c0fe99692e7ff46bc1d69b11a5ea08

  • SHA1

    1f63e2e0b1c17685558f67ef5d008b4358d2343e

  • SHA256

    1c015ce771fcaf5114418dda8f33c9d357e64de65c2ad89ba2088883a67af9b6

  • SHA512

    60c4a5ff652fd191f8cc5e4980a1230d2533250d93af198bc261e905b23ca23770056f93f666bf5fe221b81a27d55c969896eb4e59b54b10908ba9a5e7962e78

  • SSDEEP

    24576:duaHUIf+9C5Fq22F7GI8DzoLv+hJNzim0CY8iMo6bt:0aHUIf9r2QDzoj6/g8iMJ

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk/sendMessage?chat_id=7319393351

Targets

    • Target

      1c015ce771fcaf5114418dda8f33c9d357e64de65c2ad89ba2088883a67af9b6.exe

    • Size

      1.1MB

    • MD5

      40c0fe99692e7ff46bc1d69b11a5ea08

    • SHA1

      1f63e2e0b1c17685558f67ef5d008b4358d2343e

    • SHA256

      1c015ce771fcaf5114418dda8f33c9d357e64de65c2ad89ba2088883a67af9b6

    • SHA512

      60c4a5ff652fd191f8cc5e4980a1230d2533250d93af198bc261e905b23ca23770056f93f666bf5fe221b81a27d55c969896eb4e59b54b10908ba9a5e7962e78

    • SSDEEP

      24576:duaHUIf+9C5Fq22F7GI8DzoLv+hJNzim0CY8iMo6bt:0aHUIf9r2QDzoj6/g8iMJ

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Downloads MZ/PE file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks