General
-
Target
be05520944103cfdddcd92ce66e56ae66a5cb544e0669a4dd6297afabb3c75bf.zip
-
Size
700KB
-
Sample
250225-1eecxaxpx9
-
MD5
8c4c433ae36af368f26d425339831c04
-
SHA1
f37b4684d654cb33d9f3295675a4e11c65e55c58
-
SHA256
be05520944103cfdddcd92ce66e56ae66a5cb544e0669a4dd6297afabb3c75bf
-
SHA512
51bd9cfa34abf0440d68763e5f67d11ef9bf62f8d13acb1589601e7bdec7d37d3141a8db7f5cad6aed0dc631967eeb22807ebc55c48342a1b1f48047480a2291
-
SSDEEP
12288:WpTcBUmlN/Oke7/zqDZ5wXL9so/etuv/SEYYJDl/41tBAlN:W+BdlN/Ox7rqDZ5iXBYyy1tB+
Static task
static1
Behavioral task
behavioral1
Sample
INV.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
INV.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot8105864443:AAG0t_w0l1AtL3uv_XoOBi0uESWJlCjvFyg/sendMessage?chat_id=739441159
Targets
-
-
Target
INV.exe
-
Size
785KB
-
MD5
6f6bd4f765b048c7a58c68e7293024ad
-
SHA1
100a27316219257dfba134c3e62371978ab71dee
-
SHA256
52d2efe5c3788bd0e364e13cc0dbf7ad049aecab204f4032acded2c75c28c4a9
-
SHA512
af27bab8159a4ee7a1e009656a0e9b6a482aaaf9d315cd6264517d6b8689fc796db5c208a39b9fe4077acd2ab5e832daf3cf18227c28d3e6e3260ed0cdbc24cc
-
SSDEEP
12288:9wrxQOrPOZVJHK66J/O2e/xzmD75CLL9w2HMt6J/sEaYjdT5lnSBJ:9c0VJ6J/OL/ZmD75ibFaoFl
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2