General
-
Target
7c35204a5863ea44adbf5847eb13cc8df8c925ab81e41ac276dc53587e68e2f0N.exe
-
Size
760KB
-
Sample
250224-wl2pkawqs7
-
MD5
270406f122f37d2478625a3cda809730
-
SHA1
3951cb806a9a864fe4e0ed683dadc9057ea6456f
-
SHA256
7c35204a5863ea44adbf5847eb13cc8df8c925ab81e41ac276dc53587e68e2f0
-
SHA512
3ce6331bd192a490707ed77d0c0fc119672dd5c73df7089d307394f35f699371af48f5fabd78c7807d4eb79743a7807c34bed6a96d8df87256647187655331e9
-
SSDEEP
12288:fxgmsYPwgsmo23bPgGgUIr26awlYdPRGM821ZUuyybblBgMBVn0p:pSYP3VoVvO6mPc+UuZbnBVn0
Static task
static1
Behavioral task
behavioral1
Sample
7c35204a5863ea44adbf5847eb13cc8df8c925ab81e41ac276dc53587e68e2f0N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
7c35204a5863ea44adbf5847eb13cc8df8c925ab81e41ac276dc53587e68e2f0N.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7371892501:AAE6c_q-yLsVj82ZZEmMuRlQtTm95MBjCz0/sendMessage?chat_id=6750192797
Targets
-
-
Target
7c35204a5863ea44adbf5847eb13cc8df8c925ab81e41ac276dc53587e68e2f0N.exe
-
Size
760KB
-
MD5
270406f122f37d2478625a3cda809730
-
SHA1
3951cb806a9a864fe4e0ed683dadc9057ea6456f
-
SHA256
7c35204a5863ea44adbf5847eb13cc8df8c925ab81e41ac276dc53587e68e2f0
-
SHA512
3ce6331bd192a490707ed77d0c0fc119672dd5c73df7089d307394f35f699371af48f5fabd78c7807d4eb79743a7807c34bed6a96d8df87256647187655331e9
-
SSDEEP
12288:fxgmsYPwgsmo23bPgGgUIr26awlYdPRGM821ZUuyybblBgMBVn0p:pSYP3VoVvO6mPc+UuZbnBVn0
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2