General

  • Target

    RFQ for PR#029494-2025-Order.GZ

  • Size

    831KB

  • Sample

    250218-lq8zbszjbj

  • MD5

    955f83abf9098d629677cac0bce82817

  • SHA1

    0ce8ddce561631f8f105d57564dd07c298ce976a

  • SHA256

    cb69bb35525536e9bfbe0df3a6f236b34521adad075f65fa0a86c21cfb35bbd0

  • SHA512

    1b348770956963ccf70bde464da5224a922995765cd59113c40299882a04ca35159a5416b0d3a89525706b30a4b500fe8fcbbea20a13914ed3bf79b1c49d9d16

  • SSDEEP

    24576:Bqv75jpAWwpIIybwyi8AqN8tKoCmzXw67x7Qtl:MvbWbewyeqN8omZ7Q7

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7741549877:AAGvFhZZl3oxTcYaKtJFu52Jb5_V7o5wbi0/sendMessage?chat_id=1224745150

Targets

    • Target

      RFQ for PR#029494-2025-Order.GZ

    • Size

      831KB

    • MD5

      955f83abf9098d629677cac0bce82817

    • SHA1

      0ce8ddce561631f8f105d57564dd07c298ce976a

    • SHA256

      cb69bb35525536e9bfbe0df3a6f236b34521adad075f65fa0a86c21cfb35bbd0

    • SHA512

      1b348770956963ccf70bde464da5224a922995765cd59113c40299882a04ca35159a5416b0d3a89525706b30a4b500fe8fcbbea20a13914ed3bf79b1c49d9d16

    • SSDEEP

      24576:Bqv75jpAWwpIIybwyi8AqN8tKoCmzXw67x7Qtl:MvbWbewyeqN8omZ7Q7

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks