General

  • Target

    24022025_1639_24022025_Ems_inquiry_catalogues.7z

  • Size

    1.3MB

  • Sample

    250224-t5q13aspt7

  • MD5

    4abbb59f2a25ee906b104e7fadb8d915

  • SHA1

    cd9ba032cbdd7a5251e51f0febbfcb68d8e83a1d

  • SHA256

    e744231336744aa7cb7abcb25fd532ca299a9ca9f1f6d62a4c331d398739f84c

  • SHA512

    510b49e705502c07805fb8696e6c0702e441a060061095f2b087efe2a7879e9e51bc8a425b6007cb03c7629cee87c3dc7deaef73079966c50e03ed2272a60470

  • SSDEEP

    24576:dehlfmznd8Olkjh7pMLoFc3e/PIvHsj1ziinBBGgad8N04zXihts0B:AbfgndrWjhpMKmaKHM1zjXGgxN3zSv

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7538945541:AAEDj6WLyaeZtSruFCTvcpwTwP6sVcHPzO4/sendMessage?chat_id=6098953234

Targets

    • Target

      Ems_inquiry_catalogues.exe

    • Size

      1.7MB

    • MD5

      3018e9591f54c3dc959ac9834995b9b6

    • SHA1

      a50b74eb202a1c55362d6b7931fe56b7c0bb4312

    • SHA256

      0baecb92b8e375afe7db841b521040f731c923e5919fc23f42be91973366a83c

    • SHA512

      7a0cfb1d0f6bef45c759de73ec9fcb0b8c2ae17fedcacb0e201f8925dd79299bded7c62a360e0fc1f2b44073461576876076302b73cadfc7bc5a4659cbc906c2

    • SSDEEP

      24576:ELFZHUCS4BarJd8clGjBJpWLqrc3m5P+v3Ej1ZiCn7HGEah8n0WzxUmLTPZCK5Oz:EhSzJdLsjrpWEmKk3E1ZNDGE3nrzpTop

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks