General

  • Target

    facturasolicitada..exe

  • Size

    493KB

  • Sample

    250217-pae8vsymfq

  • MD5

    6124034fe55707e3ec7a9940b36a2640

  • SHA1

    fa817c784d46fdcfc065a264713c82f5f53b7288

  • SHA256

    aa928f80e184381e6cb9e2a8e159334e3494999165cf97bcd71bdfbb61dce2bf

  • SHA512

    6ea1a6caddac4f0696731f42a726a5df960aed0452aa347348805ee46f7e381be1fe4feeb6f79fa01883c248e99190a106e026973eb4dd93ca008605c6e8169e

  • SSDEEP

    12288:sUatc/gP29iwihJafg1LUBCLousN3fjAmBmwG:sUatj2MhAB73fjAAmwG

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7221326078:AAGaWyrW9EKGD1uh5gWS77zyAjwVr5QBesc/sendMessage?chat_id=7159751206

Targets

    • Target

      facturasolicitada..exe

    • Size

      493KB

    • MD5

      6124034fe55707e3ec7a9940b36a2640

    • SHA1

      fa817c784d46fdcfc065a264713c82f5f53b7288

    • SHA256

      aa928f80e184381e6cb9e2a8e159334e3494999165cf97bcd71bdfbb61dce2bf

    • SHA512

      6ea1a6caddac4f0696731f42a726a5df960aed0452aa347348805ee46f7e381be1fe4feeb6f79fa01883c248e99190a106e026973eb4dd93ca008605c6e8169e

    • SSDEEP

      12288:sUatc/gP29iwihJafg1LUBCLousN3fjAmBmwG:sUatj2MhAB73fjAAmwG

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Accesses Microsoft Outlook profiles

    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      Concludence.Cha

    • Size

      51KB

    • MD5

      1678eaebcc616fdd486b73c0d0f9a765

    • SHA1

      8e9d45a247bf04385e368f16ae88ac4c70c5ca4f

    • SHA256

      ee054a99730186790f4a20abe48b59b4254b5bb5888b4cf685f7a74092a9a6e6

    • SHA512

      7bec8100642738d1cf759f3a5226a5e96defc56697235ef50444d35fdaf82bfab8eed5addbff50b358b9ab7caf5ccbe65cea09d7d0be35a6de7f6614d2b78172

    • SSDEEP

      1536:pxAaLXZA+Iki28ydNcQOb01QZKVDxXAJb:px3dAwnXeYdNwJ

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks