General

  • Target

    Shipping Doc.exe

  • Size

    6.2MB

  • Sample

    250224-nbmtnayrv7

  • MD5

    c1a36512984e3f51b2bdcd3393d8d6a9

  • SHA1

    f091dd5a9f5b9eb96fe2539d65326795138bddae

  • SHA256

    deaa014f300d7bf4cbdbf3f9eb810e7768164ae333408f9e1362402cd3e44cf7

  • SHA512

    76f190cdfbe7a61f89303a32c4ab49c0061c0ac07d3e81c22e7af99d3ce96ec37ad5fade764af353dff2f1df4f9b22c8137b3a0128f3543d80af37d2133308ca

  • SSDEEP

    98304:GaJCT156oFdFxqpcB5aSTWQ650RFl7Ag7YMyyMCYC:GaJCvEUaSTWQE0ff3V

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7170890959:AAElMC-MH2d54uixSWnB3n9GGxu8k0ZCcw0/sendMessage?chat_id=6915394402

Targets

    • Target

      Shipping Doc.exe

    • Size

      6.2MB

    • MD5

      c1a36512984e3f51b2bdcd3393d8d6a9

    • SHA1

      f091dd5a9f5b9eb96fe2539d65326795138bddae

    • SHA256

      deaa014f300d7bf4cbdbf3f9eb810e7768164ae333408f9e1362402cd3e44cf7

    • SHA512

      76f190cdfbe7a61f89303a32c4ab49c0061c0ac07d3e81c22e7af99d3ce96ec37ad5fade764af353dff2f1df4f9b22c8137b3a0128f3543d80af37d2133308ca

    • SSDEEP

      98304:GaJCT156oFdFxqpcB5aSTWQ650RFl7Ag7YMyyMCYC:GaJCvEUaSTWQE0ff3V

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks