General
-
Target
17022025_1103_16022025_SPECIFICATIONS112025.zip
-
Size
689KB
-
Sample
250217-m84yrsyldj
-
MD5
ba7740b2e86b9ee4c3bf371596913228
-
SHA1
25465a1bfe8153c23ec1cfb0be0804d0c3824dfd
-
SHA256
505cf273e72cebcf852c6e96d4552b50dd57975b213fca6c8ec87069923c866c
-
SHA512
943eb3850730a947cecd94a3957f0ff3db77ada497b6db40269b3813d98e64a73e1259113595322149b324dcf5c4146cb29a9eeb22ae052e4445b89969295283
-
SSDEEP
12288:gyG5YaOr7XXJfmnHpHnwpnlO/3eMmeBJhhS9zBdL4LxTTJU6sfRNj2uyuncK:gyc9OrjSQpDMmePfSvdL4LNTJU6s5Njz
Static task
static1
Behavioral task
behavioral1
Sample
SPECIFICATIONS112025.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
SPECIFICATIONS112025.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7691385902:AAE3XO9fSZaslUuLJsnstHhsbkGKUMXLieU/sendMessage?chat_id=7463064549
Targets
-
-
Target
SPECIFICATIONS112025.exe
-
Size
1.1MB
-
MD5
1b941eb0d1776fc0a50f6a68162e0cb2
-
SHA1
59528929deb3d83d73b57fc68487b2edd41d7b95
-
SHA256
74a376edcff8224f1dcbb9f18ff4f10251e149f2073d9d0e0364ac5a0c599e88
-
SHA512
7a52449d6d9238ca0cce15ea51387aabe09e85b25b8e32fab6b3909b38f941fe87ae9b8239f5ab6d3c0beb18b75cf1b578dc3aaaae3553c60a2c8e1d3dd08e68
-
SSDEEP
24576:Hu6J33O0c+JY5UZ+XC0kGso6Fa40PVL45NTFw6KdNDaLTHWY:Bu0c++OCvkGs9Fa40tdNOLCY
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1