General
-
Target
0f47b255f3dc01df1db085ca6797a173cee2ea530f8dadaf0a87b63a4c1fa047N.exe
-
Size
890KB
-
Sample
250216-zal2hsykfx
-
MD5
8cf8c5875c32bc92d25acf0e319fc120
-
SHA1
c41082040f6213648c25cee405c5872e4c0da155
-
SHA256
0f47b255f3dc01df1db085ca6797a173cee2ea530f8dadaf0a87b63a4c1fa047
-
SHA512
be53a8c19c26978ff87bdd40c4872655f86caf9bb07b9f7da5763a8387133f219d5a6a2f35ae761c2842cc444303dae3094015746cccd3164da6e3d22d5f5ca0
-
SSDEEP
24576:F6g7wwDEGmv9ax8qezKoL9hYThImgvo3dXJ:FTpDbQYGL92evIl
Static task
static1
Behavioral task
behavioral1
Sample
0f47b255f3dc01df1db085ca6797a173cee2ea530f8dadaf0a87b63a4c1fa047N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0f47b255f3dc01df1db085ca6797a173cee2ea530f8dadaf0a87b63a4c1fa047N.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.bteenerji.com - Port:
587 - Username:
[email protected] - Password:
123husnu - Email To:
[email protected]
https://api.telegram.org/bot7354418955:AAH10FAR8IByRBtd_Qs69uwN7lnhl-2X18k/sendMessage?chat_id=6851554211
Targets
-
-
Target
0f47b255f3dc01df1db085ca6797a173cee2ea530f8dadaf0a87b63a4c1fa047N.exe
-
Size
890KB
-
MD5
8cf8c5875c32bc92d25acf0e319fc120
-
SHA1
c41082040f6213648c25cee405c5872e4c0da155
-
SHA256
0f47b255f3dc01df1db085ca6797a173cee2ea530f8dadaf0a87b63a4c1fa047
-
SHA512
be53a8c19c26978ff87bdd40c4872655f86caf9bb07b9f7da5763a8387133f219d5a6a2f35ae761c2842cc444303dae3094015746cccd3164da6e3d22d5f5ca0
-
SSDEEP
24576:F6g7wwDEGmv9ax8qezKoL9hYThImgvo3dXJ:FTpDbQYGL92evIl
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2