General
-
Target
d80bc3650a7d950ee6fc4dfba00ff0044c782b56a472a0bc62aabe890ec9d76cN.exe
-
Size
868KB
-
Sample
250216-1kaxnsznbs
-
MD5
bfe69cac043c9a0640da5befe815db50
-
SHA1
e38439d309f84eba69d5c731d19aa6708fed4d31
-
SHA256
d80bc3650a7d950ee6fc4dfba00ff0044c782b56a472a0bc62aabe890ec9d76c
-
SHA512
0b1ae9b7e48f2ce359d4df10f5ed11aefbaa7bc51dd3da3fca8f0b227bf00788bde7661bc27ee027b23a56ca2aebf57484ac02c3b5a2de118932b1da882b856c
-
SSDEEP
12288:iA33eneMm/Oq41OLFAh/n9Bt3albCqnQOyQVjxvjjWcDsUjhhvtSQe9jkgnT2lPN:x38eyF1wFuVH3sCqZbDsQhhJek62BK
Static task
static1
Behavioral task
behavioral1
Sample
d80bc3650a7d950ee6fc4dfba00ff0044c782b56a472a0bc62aabe890ec9d76cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d80bc3650a7d950ee6fc4dfba00ff0044c782b56a472a0bc62aabe890ec9d76cN.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7350487170:AAF5czghqozwJ3jvqAKxdLlpsfo5ndht3IU/sendMessage?chat_id=1224745150
Targets
-
-
Target
d80bc3650a7d950ee6fc4dfba00ff0044c782b56a472a0bc62aabe890ec9d76cN.exe
-
Size
868KB
-
MD5
bfe69cac043c9a0640da5befe815db50
-
SHA1
e38439d309f84eba69d5c731d19aa6708fed4d31
-
SHA256
d80bc3650a7d950ee6fc4dfba00ff0044c782b56a472a0bc62aabe890ec9d76c
-
SHA512
0b1ae9b7e48f2ce359d4df10f5ed11aefbaa7bc51dd3da3fca8f0b227bf00788bde7661bc27ee027b23a56ca2aebf57484ac02c3b5a2de118932b1da882b856c
-
SSDEEP
12288:iA33eneMm/Oq41OLFAh/n9Bt3albCqnQOyQVjxvjjWcDsUjhhvtSQe9jkgnT2lPN:x38eyF1wFuVH3sCqZbDsQhhJek62BK
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2