General

  • Target

    pre-alert.zip

  • Size

    1022KB

  • Sample

    250219-k1q1tsxrdm

  • MD5

    cf28ee1e0bc7e557fd06fd89e3cb5b0c

  • SHA1

    af655d2b91a0a607184760daeef1aa2e55cf78a5

  • SHA256

    b5ef552757eeaf4d9be10ad82153244d76f8e8d065494759ff77fcbdabb68f26

  • SHA512

    d636063c8e97564a2964814b26dff5ea1e55f8bea16fd8f54ddc38e491daf09f5c4fc00699fb27a11a7da58e2e4ec4b431e39fb71e17d8999f2ddc1c1d228bd6

  • SSDEEP

    24576:c6accOKKsN3EZqbB4lL+W+7EQn8eN7VtyD1wgqxxfuhYNIYYd:BvrzOUZqbB9hEQ8ctyD1wgWZuyNIYYd

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7452517787:AAFRCQzX_IamMx-kAJG8lXDhSv2cnnBqR7U/sendMessage?chat_id=7256026967

Targets

    • Target

      pre-alert.exe

    • Size

      1.2MB

    • MD5

      aedc7ecabe46230d60a8059c86ddda08

    • SHA1

      236dfa67dd9cd0c01500aa0a04c80aa3ca577d1c

    • SHA256

      f9925fbe9ba09a653092fabbcf4b097e46651f500ae7cfaf1f68515168b333c5

    • SHA512

      e26c1bece49d319a3777291fd94ba3fefd364940a2cb06cfc3a6cdc8a781c2aee5402db0cadd4d4a5780463662642ece5bec0fc3647103e6633ace07a16fc352

    • SSDEEP

      24576:tq5eIN453LV5B4v/cug7em7x0XsC6jjR5yPDNFo2s0O8BD48rWHFDW+1RUrK:vIN2Z5B5zem7x0TY5yPDfoL0O8BD48rC

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks