General

  • Target

    be2fa311c0f0bc777b15840c76d527fe.exe

  • Size

    1.6MB

  • Sample

    250222-hxtlfa1mcm

  • MD5

    be2fa311c0f0bc777b15840c76d527fe

  • SHA1

    b4b1c5c4eb2fd90ab55c0412366395509e4c3b32

  • SHA256

    43d217bd9afb270a687f6eded8015879286c309abffe411c3af9bcc1805f340c

  • SHA512

    43ffc9c72c66fe3cbd6cd0c67e2f26252d559f62417af50ed01d9572d47d23460bd4d020d8e4f7615783489ad6d0ec10a17e081d2b1d731e396bb18158a3622c

  • SSDEEP

    24576:QE84EOnPNsjP6NUlwSX+R3qOV50H76o8p7/i+c5ST:QRqUlT/OV5kK0+c5W

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7741549877:AAGvFhZZl3oxTcYaKtJFu52Jb5_V7o5wbi0/sendMessage?chat_id=1224745150

Targets

    • Target

      be2fa311c0f0bc777b15840c76d527fe.exe

    • Size

      1.6MB

    • MD5

      be2fa311c0f0bc777b15840c76d527fe

    • SHA1

      b4b1c5c4eb2fd90ab55c0412366395509e4c3b32

    • SHA256

      43d217bd9afb270a687f6eded8015879286c309abffe411c3af9bcc1805f340c

    • SHA512

      43ffc9c72c66fe3cbd6cd0c67e2f26252d559f62417af50ed01d9572d47d23460bd4d020d8e4f7615783489ad6d0ec10a17e081d2b1d731e396bb18158a3622c

    • SSDEEP

      24576:QE84EOnPNsjP6NUlwSX+R3qOV50H76o8p7/i+c5ST:QRqUlT/OV5kK0+c5W

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks