General

  • Target

    59feca703bbe5b155c79ff9fef0738aa92ec174603a8e7b2b547bf05b79764ef

  • Size

    735KB

  • Sample

    250219-ehjwxawpfl

  • MD5

    5703525b77cc01dfdcd19a0ec060b5f2

  • SHA1

    33444bac1f1cf3547c9ce71f688d2cd357dc58ab

  • SHA256

    59feca703bbe5b155c79ff9fef0738aa92ec174603a8e7b2b547bf05b79764ef

  • SHA512

    d5dd1a22f783763f4f09e687dea8250f82b6691ef7cf896767708a7fd5c89f6273cffa30dee9a205d767e5b97d3170b7faae88cfdc06a684d8950b0ccc3bfd2c

  • SSDEEP

    12288:IN+HZEI7DxvuhzpGjeYfTM9uSnY1LUyDVtBab1/RDLEFYgAEYBPRuwxnlGxgF:mIh0hIjfbUlYK/hEFYgOPRRxn8OF

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7236590670:AAEZk9ec6tcUIipI8D5VK8zyHeQjcafFyOY/sendMessage?chat_id=2052461776

Targets

    • Target

      PO#241338.scr

    • Size

      916KB

    • MD5

      1f9a219a3d4f7c497c3f6d6cb47bcc77

    • SHA1

      064ee4b1212e99be9857020c63726fa3aa88c079

    • SHA256

      105bcf11c1495556915d031574274e27a636b1e32f6b45a22bdb440ec1796b66

    • SHA512

      c5639c4f6a4b5670347b6a735c3f979c8b03ba2f7574080ef775eaab8b522e986dc25c80299a910282b9ad03444bccd7cb468d8e8aaf6a6da44ce452e85136bb

    • SSDEEP

      24576:FMRHPv6tkV37EUl8T5UfupJvjniUNsiQMRH:FMZqaV3Vl842vbZTQMZ

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks