General
-
Target
1b275e46dfcc1e187a0826c1e5c8eab33561445b48556db2aba49cdbe4470790.exe
-
Size
996KB
-
Sample
250220-cqeaaavjcn
-
MD5
014bc822578f34fccd7b3c5d4b0cf7f3
-
SHA1
54a99f4294371524fc35e3759c1ce581743291d1
-
SHA256
1b275e46dfcc1e187a0826c1e5c8eab33561445b48556db2aba49cdbe4470790
-
SHA512
a7ce9fc2c15545b6227fb68abbb9f5aac533ba2919e4c89e16af3a2ac0dd5f47a2ceef6bd10258bf75ad173335ad0260bb76a5752c6e18e86479df57ab881070
-
SSDEEP
24576:/Gx7qmjT0AGeQ6f9TvWb1OivG16CKK/XKRyghvmQfHPJTDc:cvjT0b6tvLIm6oMthfHBk
Static task
static1
Behavioral task
behavioral1
Sample
1b275e46dfcc1e187a0826c1e5c8eab33561445b48556db2aba49cdbe4470790.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1b275e46dfcc1e187a0826c1e5c8eab33561445b48556db2aba49cdbe4470790.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.novacitacor.pt - Port:
587 - Username:
[email protected] - Password:
#Novasystem123# - Email To:
[email protected]
https://api.telegram.org/bot7502066508:AAGz5-yl79jZ7Tfefk024IrMFNLc6CGJF4I/sendMessage?chat_id=6978326966
Targets
-
-
Target
1b275e46dfcc1e187a0826c1e5c8eab33561445b48556db2aba49cdbe4470790.exe
-
Size
996KB
-
MD5
014bc822578f34fccd7b3c5d4b0cf7f3
-
SHA1
54a99f4294371524fc35e3759c1ce581743291d1
-
SHA256
1b275e46dfcc1e187a0826c1e5c8eab33561445b48556db2aba49cdbe4470790
-
SHA512
a7ce9fc2c15545b6227fb68abbb9f5aac533ba2919e4c89e16af3a2ac0dd5f47a2ceef6bd10258bf75ad173335ad0260bb76a5752c6e18e86479df57ab881070
-
SSDEEP
24576:/Gx7qmjT0AGeQ6f9TvWb1OivG16CKK/XKRyghvmQfHPJTDc:cvjT0b6tvLIm6oMthfHBk
-
Guloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
b853d5d2361ade731e33e882707efc34
-
SHA1
c58b1aeabdf1cbb8334ef8797e7aceaa7a1cb6be
-
SHA256
f0cd96e0b6e40f92ad1aa0efacde833bae807b92fca19bf062c1cf8acf29484b
-
SHA512
8ea31d82ffa6f58dab5632fe72690d3a6db0be65aec85fc8a1f71626773c0974dcebefae17bcf67c4c56ef442545e985eea0b348ff6e4fc36740640092b08d69
-
SSDEEP
192:eA2HS+ihg200uWz947Wzvxu6v0MI7JOde+Ij5Z77dslFsEf:mS62Gw947ExuGDI7J8EF7KIE
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2