General

  • Target

    e65e5f65b78555a62e8692443cbd4f5ec136d9f76e00645c63d4689fbe9fb239

  • Size

    669KB

  • Sample

    250226-d5sa5awkz5

  • MD5

    d58b6f082bae9bb40004eadfb4937288

  • SHA1

    8fc455416fef17bb4337f21d90364867c78848f1

  • SHA256

    e65e5f65b78555a62e8692443cbd4f5ec136d9f76e00645c63d4689fbe9fb239

  • SHA512

    07217335b67be498b6ba93440f174da9f9664706a1298c2f6c1173b3f59cf667942c02e249ca1561b36af3e5c8d2e70fa039577944e3ee974ca8280fdf1f6fa8

  • SSDEEP

    12288:kKY3I/WD1wNOyOaqXg9wKK2ewrkABW1c7OCC/kgVbmzJewbb3wRrxP592Obhu4Ps:60lPqf1LRsImzJfbc3xJd/PWz

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7236590670:AAEZk9ec6tcUIipI8D5VK8zyHeQjcafFyOY/sendMessage?chat_id=2052461776

Targets

    • Target

      PO 10947.scr

    • Size

      750KB

    • MD5

      bbac3e04dd6ecf41684b9210d1a56780

    • SHA1

      63995f9db174c00ff5b376539a941d2cd527d5cf

    • SHA256

      b256e7a7a09ef8474a102c210f9a720614b7d37985922b7d62b17bf7aaed7ddd

    • SHA512

      9f431a364e4a9701a3d167220a5efa6a0681f6fefc1883020cc9e9c33796db5ac90f3f4cc61b67d099ab3827ca84b429140c2be3f21c26f6dfd4374652c64b71

    • SSDEEP

      12288:67383le9cizU+2KbNBaxnh38c4lVRCnYIbPsd6vU+pWts+9vuFCe:6L3VUp4aH8cMmnYJ6v7aoC

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks