General

  • Target

    facturar.exe

  • Size

    781KB

  • Sample

    250217-ny8pmszk12

  • MD5

    dc6405171400ba31490159b7e59eae0b

  • SHA1

    59ac7ab360bda219ab6aa5b8b57fd5d3a1f7ec73

  • SHA256

    8e533c355130e312b4bdecd237c49d50cf8d12c5f88fbe991ecaac462f84c9a6

  • SHA512

    15944b966bad130dece39b2b958073b5c63806f8f8441e193af481c2349bd896d2f599bc9dc82ca4a5233802d225245ea5e1b459a6c9033485189be7a7a7ba08

  • SSDEEP

    12288:2tlyuHaQfKrVOnQlp6UV/ytzlI/Xr+urZTbq9pK0R6iyNc3pipkyfGSN:AbQknM6UJylurZTG9pK+65c5yfFN

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot8065011306:AAGGqcKWP-Xh6cM1C2XjGGRyWEn_Dwu0gBc/sendMessage?chat_id=6096718960

Targets

    • Target

      facturar.exe

    • Size

      781KB

    • MD5

      dc6405171400ba31490159b7e59eae0b

    • SHA1

      59ac7ab360bda219ab6aa5b8b57fd5d3a1f7ec73

    • SHA256

      8e533c355130e312b4bdecd237c49d50cf8d12c5f88fbe991ecaac462f84c9a6

    • SHA512

      15944b966bad130dece39b2b958073b5c63806f8f8441e193af481c2349bd896d2f599bc9dc82ca4a5233802d225245ea5e1b459a6c9033485189be7a7a7ba08

    • SSDEEP

      12288:2tlyuHaQfKrVOnQlp6UV/ytzlI/Xr+urZTbq9pK0R6iyNc3pipkyfGSN:AbQknM6UJylurZTG9pK+65c5yfFN

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Accesses Microsoft Outlook profiles

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      dydsmnstres.Akk

    • Size

      51KB

    • MD5

      6875aced8bc3c45045c03780bcf82992

    • SHA1

      6be537d374bfe83e5d563344a047a76519e149bf

    • SHA256

      58c38113bea6b0e3310ff986103d948b0c0e149c75f4332afc5d40d515ed2642

    • SHA512

      060f041e007fb1405927503858b1cdbb7670f9129df2f39157691291cc57080d24a737a6e65bd87852ab276e85cfbc727d7084fcc7b8a1e4b026e745357c2c0d

    • SSDEEP

      1536:KbdwoGcteJbVhMEjCMpY9olnnNf+/8V0jTq:l7xVCEVpY9qnNf+/kP

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks