General
-
Target
7f2fb82d726429669b01c087af39e2c26526be72561d28b89e3de54c1cd92d87.exe
-
Size
868KB
-
Sample
250216-rne65azqav
-
MD5
8e8054ce279db154a26b2deda3d22d77
-
SHA1
351510153cb4c6ed192a6a4c135e05636d568ad8
-
SHA256
7f2fb82d726429669b01c087af39e2c26526be72561d28b89e3de54c1cd92d87
-
SHA512
b9f0ac0915987bd963b250c3fbf75e8433e9aa8fda7bdca773dfb5d335db1eddcf1ea3e88e0b00f58fef9a7014894f2f61146ea36c83a01a527146c02507f8ba
-
SSDEEP
12288:iA33eneMm/Oq41OLFAh/n9Bt3albCqnQOyQVjxvjjWcDsUjhhvtSQe9jkgnT2lPd:x38eyF1wFuVH3sCqZbDsQhhJek62BK4
Static task
static1
Behavioral task
behavioral1
Sample
7f2fb82d726429669b01c087af39e2c26526be72561d28b89e3de54c1cd92d87.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7f2fb82d726429669b01c087af39e2c26526be72561d28b89e3de54c1cd92d87.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7350487170:AAF5czghqozwJ3jvqAKxdLlpsfo5ndht3IU/sendMessage?chat_id=1224745150
Targets
-
-
Target
7f2fb82d726429669b01c087af39e2c26526be72561d28b89e3de54c1cd92d87.exe
-
Size
868KB
-
MD5
8e8054ce279db154a26b2deda3d22d77
-
SHA1
351510153cb4c6ed192a6a4c135e05636d568ad8
-
SHA256
7f2fb82d726429669b01c087af39e2c26526be72561d28b89e3de54c1cd92d87
-
SHA512
b9f0ac0915987bd963b250c3fbf75e8433e9aa8fda7bdca773dfb5d335db1eddcf1ea3e88e0b00f58fef9a7014894f2f61146ea36c83a01a527146c02507f8ba
-
SSDEEP
12288:iA33eneMm/Oq41OLFAh/n9Bt3albCqnQOyQVjxvjjWcDsUjhhvtSQe9jkgnT2lPd:x38eyF1wFuVH3sCqZbDsQhhJek62BK4
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2