Overview
overview
10Static
static
3Pago.rar
windows7-x64
1Pago.rar
windows10-2004-x64
1Skery.exe
windows7-x64
7Skery.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Cyberangre...29.bus
windows7-x64
3Cyberangre...29.bus
windows10-2004-x64
3Cyberangre...ic.ini
windows7-x64
1Cyberangre...ic.ini
windows10-2004-x64
1Cyberangre...gon250
windows7-x64
3Cyberangre...gon250
windows10-2004-x64
3Cyberangre...51.jpg
windows7-x64
3Cyberangre...51.jpg
windows10-2004-x64
4Cyberangre...es.txt
windows7-x64
1Cyberangre...es.txt
windows10-2004-x64
1Cyberangre...gs.txt
windows7-x64
1Cyberangre...gs.txt
windows10-2004-x64
1Cyberangre...ry.pad
windows7-x64
3Cyberangre...ry.pad
windows10-2004-x64
3Cyberangre...rs.txt
windows7-x64
1Cyberangre...rs.txt
windows10-2004-x64
1Cyberangre...ns.txt
windows7-x64
1Cyberangre...ns.txt
windows10-2004-x64
1Cyberangre...ne.int
windows7-x64
3Cyberangre...ne.int
windows10-2004-x64
3Cyberangre...ca.rei
windows7-x64
3Cyberangre...ca.rei
windows10-2004-x64
3Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2025, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
Pago.rar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Pago.rar
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Skery.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Skery.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Cyberangreb/Acanthopterous29.bus
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Cyberangreb/Acanthopterous29.bus
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Cyberangreb/Aphthartodocetic.ini
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Cyberangreb/Aphthartodocetic.ini
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
Cyberangreb/Repetatively/Fljtetndes.gon250
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Cyberangreb/Repetatively/Fljtetndes.gon250
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Cyberangreb/Repetatively/Innovativeness151.jpg
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Cyberangreb/Repetatively/Innovativeness151.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Cyberangreb/Repetatively/desorienteres.txt
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
Cyberangreb/Repetatively/desorienteres.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Cyberangreb/Repetatively/gennemskylnings.txt
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Cyberangreb/Repetatively/gennemskylnings.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
Cyberangreb/Repetatively/gerry.pad
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Cyberangreb/Repetatively/gerry.pad
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
Cyberangreb/Repetatively/inkassogebyrers.txt
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Cyberangreb/Repetatively/inkassogebyrers.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
Cyberangreb/Repetatively/klasikkens.txt
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
Cyberangreb/Repetatively/klasikkens.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
Cyberangreb/Repetatively/opdateringssiderne.int
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
Cyberangreb/Repetatively/opdateringssiderne.int
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
Cyberangreb/Repetatively/pataca.rei
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Cyberangreb/Repetatively/pataca.rei
Resource
win10v2004-20250217-en
General
-
Target
Skery.exe
-
Size
673KB
-
MD5
23c5b9f638e095f67c6e0c038431f24b
-
SHA1
6b3366c3ff8aa8576c520adb20f6fdea2393ed7f
-
SHA256
380487150b51a339c3d8c34526c0109d9b5a904aee3e41abc62c04a63ec18dfb
-
SHA512
0dea689116a01ac15e11420cdbfc01bf70b010fc175f726e873f2f32356d2521dbaf9369b193ca8439a98f29950e5a51e98598e03af5a8995a561b3523b74d15
-
SSDEEP
12288:Xa/AcZ6qJ2s1+pBOijz3U1PbGf+883INo89u/r2XdgjPEmADNA0EpphZNG2q:X4Z6SQB5/3U5SWN3INFu/9jsmY0q
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7888169387:AAFhsoUaeWK9XqbrEJl452LFnH_AAaGbsWI/sendMessage?chat_id=6838630391
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL 2 IoCs
pid Process 2992 Skery.exe 2992 Skery.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Skery.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Skery.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Skery.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 24 drive.google.com 25 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 43 checkip.dyndns.org 50 reallyfreegeoip.org 51 reallyfreegeoip.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4324 Skery.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2992 Skery.exe 4324 Skery.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Skery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Skery.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4324 Skery.exe 4324 Skery.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2992 Skery.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4324 Skery.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 4324 2992 Skery.exe 87 PID 2992 wrote to memory of 4324 2992 Skery.exe 87 PID 2992 wrote to memory of 4324 2992 Skery.exe 87 PID 2992 wrote to memory of 4324 2992 Skery.exe 87 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Skery.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Skery.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Skery.exe"C:\Users\Admin\AppData\Local\Temp\Skery.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\Skery.exe"C:\Users\Admin\AppData\Local\Temp\Skery.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4324
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
860B
MD5ef597fcc608ced0ecf4083b7d9587da1
SHA1c9052b2fe35e85d1173e6a09d35016e7c79c2a64
SHA256acdaa3db55b4f32391dde5567ac43635712f2f2e0aaa62f6ba66f54131e9e357
SHA512ff2f00eb2bfb0bd1527d12584fc3397484f8d9439dac3ad480416ff8b749c800c2fc2846282e83f7c9895af706bd09a11c36a864449dba2785daf443c91ab145