General

  • Target

    AWB5305323204643.exe

  • Size

    1.8MB

  • Sample

    250225-r4jt9a1jy9

  • MD5

    f4aafd3c1d6cd42208b22a1247c9173d

  • SHA1

    1fe9b387b96e6a6b2dc0736bea67a3a93b0357b6

  • SHA256

    fe82ebf70e17a486c040741c41f882d46bf2328986276bc4fcae991a2c126a18

  • SHA512

    746572fdd1dfed6465ffc065f1f3d5ade6d1f995af3fa16604872473023d657c587e26cde9fffbd5b000e0a7b0d7714a1e93bf3a86e79e2fcd1c586b3ec8df2a

  • SSDEEP

    49152:+19q39adgJW0w0s/2gzOkB8IaEAehfeeAi4jw0+EckLh0Y5Y:+19aJm/dOS8IXAehfSdwPVkLiL

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7552206830:AAGZUrvJgSRgT_tfVCG5NR-NdC35UuRR1yg/sendMessage?chat_id=6357516296

Targets

    • Target

      AWB5305323204643.exe

    • Size

      1.8MB

    • MD5

      f4aafd3c1d6cd42208b22a1247c9173d

    • SHA1

      1fe9b387b96e6a6b2dc0736bea67a3a93b0357b6

    • SHA256

      fe82ebf70e17a486c040741c41f882d46bf2328986276bc4fcae991a2c126a18

    • SHA512

      746572fdd1dfed6465ffc065f1f3d5ade6d1f995af3fa16604872473023d657c587e26cde9fffbd5b000e0a7b0d7714a1e93bf3a86e79e2fcd1c586b3ec8df2a

    • SSDEEP

      49152:+19q39adgJW0w0s/2gzOkB8IaEAehfeeAi4jw0+EckLh0Y5Y:+19aJm/dOS8IXAehfSdwPVkLiL

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks