General

  • Target

    3193967e6f4f4475cb744fece3bd2e7cdc6b3dce1694d0371e2865305ee3c97b.exe

  • Size

    1.1MB

  • Sample

    250218-cs9tzawkhn

  • MD5

    0e90c7c0d54420a58998a5e6dfb0ecf1

  • SHA1

    6b2889f49aa83bd04db89e3b4dc78455670c1272

  • SHA256

    3193967e6f4f4475cb744fece3bd2e7cdc6b3dce1694d0371e2865305ee3c97b

  • SHA512

    72db605e5a75228decff4dcfcf988d9f0c8361679bebfdfb4721c782d9b8904ae0d33d94de31aca114dc50ff8d64435711298d202187a8de4602e1f48a458867

  • SSDEEP

    24576:TV8oc0J58R3kckrNTywbfqiPACOedfHYNXNHA6Z:TV8fM8z4NL/ACOdHA4

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot8119135929:AAGv_owQnXugQZM3K0TRex_pZFatMkYkfzY/sendMessage?chat_id=6838630391

Targets

    • Target

      3193967e6f4f4475cb744fece3bd2e7cdc6b3dce1694d0371e2865305ee3c97b.exe

    • Size

      1.1MB

    • MD5

      0e90c7c0d54420a58998a5e6dfb0ecf1

    • SHA1

      6b2889f49aa83bd04db89e3b4dc78455670c1272

    • SHA256

      3193967e6f4f4475cb744fece3bd2e7cdc6b3dce1694d0371e2865305ee3c97b

    • SHA512

      72db605e5a75228decff4dcfcf988d9f0c8361679bebfdfb4721c782d9b8904ae0d33d94de31aca114dc50ff8d64435711298d202187a8de4602e1f48a458867

    • SSDEEP

      24576:TV8oc0J58R3kckrNTywbfqiPACOedfHYNXNHA6Z:TV8fM8z4NL/ACOdHA4

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      34442e1e0c2870341df55e1b7b3cccdc

    • SHA1

      99b2fa21aead4b6ccd8ff2f6d3d3453a51d9c70c

    • SHA256

      269d232712c86983336badb40b9e55e80052d8389ed095ebf9214964d43b6bb1

    • SHA512

      4a8c57fb12997438b488b862f3fc9dc0f236e07bb47b2bce6053dcb03ac7ad171842f02ac749f02dda4719c681d186330524cd2953d33cb50854844e74b33d51

    • SSDEEP

      192:jPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4I:u7VpNo8gmOyRsVc4

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks