General

  • Target

    1b275e46dfcc1e187a0826c1e5c8eab33561445b48556db2aba49cdbe4470790.exe

  • Size

    996KB

  • Sample

    250220-cqeaaavjcn

  • MD5

    014bc822578f34fccd7b3c5d4b0cf7f3

  • SHA1

    54a99f4294371524fc35e3759c1ce581743291d1

  • SHA256

    1b275e46dfcc1e187a0826c1e5c8eab33561445b48556db2aba49cdbe4470790

  • SHA512

    a7ce9fc2c15545b6227fb68abbb9f5aac533ba2919e4c89e16af3a2ac0dd5f47a2ceef6bd10258bf75ad173335ad0260bb76a5752c6e18e86479df57ab881070

  • SSDEEP

    24576:/Gx7qmjT0AGeQ6f9TvWb1OivG16CKK/XKRyghvmQfHPJTDc:cvjT0b6tvLIm6oMthfHBk

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7502066508:AAGz5-yl79jZ7Tfefk024IrMFNLc6CGJF4I/sendMessage?chat_id=6978326966

Targets

    • Target

      1b275e46dfcc1e187a0826c1e5c8eab33561445b48556db2aba49cdbe4470790.exe

    • Size

      996KB

    • MD5

      014bc822578f34fccd7b3c5d4b0cf7f3

    • SHA1

      54a99f4294371524fc35e3759c1ce581743291d1

    • SHA256

      1b275e46dfcc1e187a0826c1e5c8eab33561445b48556db2aba49cdbe4470790

    • SHA512

      a7ce9fc2c15545b6227fb68abbb9f5aac533ba2919e4c89e16af3a2ac0dd5f47a2ceef6bd10258bf75ad173335ad0260bb76a5752c6e18e86479df57ab881070

    • SSDEEP

      24576:/Gx7qmjT0AGeQ6f9TvWb1OivG16CKK/XKRyghvmQfHPJTDc:cvjT0b6tvLIm6oMthfHBk

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      b853d5d2361ade731e33e882707efc34

    • SHA1

      c58b1aeabdf1cbb8334ef8797e7aceaa7a1cb6be

    • SHA256

      f0cd96e0b6e40f92ad1aa0efacde833bae807b92fca19bf062c1cf8acf29484b

    • SHA512

      8ea31d82ffa6f58dab5632fe72690d3a6db0be65aec85fc8a1f71626773c0974dcebefae17bcf67c4c56ef442545e985eea0b348ff6e4fc36740640092b08d69

    • SSDEEP

      192:eA2HS+ihg200uWz947Wzvxu6v0MI7JOde+Ij5Z77dslFsEf:mS62Gw947ExuGDI7J8EF7KIE

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks