General

  • Target

    0f47b255f3dc01df1db085ca6797a173cee2ea530f8dadaf0a87b63a4c1fa047N.exe

  • Size

    890KB

  • Sample

    250216-zal2hsykfx

  • MD5

    8cf8c5875c32bc92d25acf0e319fc120

  • SHA1

    c41082040f6213648c25cee405c5872e4c0da155

  • SHA256

    0f47b255f3dc01df1db085ca6797a173cee2ea530f8dadaf0a87b63a4c1fa047

  • SHA512

    be53a8c19c26978ff87bdd40c4872655f86caf9bb07b9f7da5763a8387133f219d5a6a2f35ae761c2842cc444303dae3094015746cccd3164da6e3d22d5f5ca0

  • SSDEEP

    24576:F6g7wwDEGmv9ax8qezKoL9hYThImgvo3dXJ:FTpDbQYGL92evIl

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7354418955:AAH10FAR8IByRBtd_Qs69uwN7lnhl-2X18k/sendMessage?chat_id=6851554211

Targets

    • Target

      0f47b255f3dc01df1db085ca6797a173cee2ea530f8dadaf0a87b63a4c1fa047N.exe

    • Size

      890KB

    • MD5

      8cf8c5875c32bc92d25acf0e319fc120

    • SHA1

      c41082040f6213648c25cee405c5872e4c0da155

    • SHA256

      0f47b255f3dc01df1db085ca6797a173cee2ea530f8dadaf0a87b63a4c1fa047

    • SHA512

      be53a8c19c26978ff87bdd40c4872655f86caf9bb07b9f7da5763a8387133f219d5a6a2f35ae761c2842cc444303dae3094015746cccd3164da6e3d22d5f5ca0

    • SSDEEP

      24576:F6g7wwDEGmv9ax8qezKoL9hYThImgvo3dXJ:FTpDbQYGL92evIl

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks