General

  • Target

    be05520944103cfdddcd92ce66e56ae66a5cb544e0669a4dd6297afabb3c75bf.zip

  • Size

    700KB

  • Sample

    250226-e4qlksynz3

  • MD5

    8c4c433ae36af368f26d425339831c04

  • SHA1

    f37b4684d654cb33d9f3295675a4e11c65e55c58

  • SHA256

    be05520944103cfdddcd92ce66e56ae66a5cb544e0669a4dd6297afabb3c75bf

  • SHA512

    51bd9cfa34abf0440d68763e5f67d11ef9bf62f8d13acb1589601e7bdec7d37d3141a8db7f5cad6aed0dc631967eeb22807ebc55c48342a1b1f48047480a2291

  • SSDEEP

    12288:WpTcBUmlN/Oke7/zqDZ5wXL9so/etuv/SEYYJDl/41tBAlN:W+BdlN/Ox7rqDZ5iXBYyy1tB+

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot8105864443:AAG0t_w0l1AtL3uv_XoOBi0uESWJlCjvFyg/sendMessage?chat_id=739441159

Targets

    • Target

      INV.exe

    • Size

      785KB

    • MD5

      6f6bd4f765b048c7a58c68e7293024ad

    • SHA1

      100a27316219257dfba134c3e62371978ab71dee

    • SHA256

      52d2efe5c3788bd0e364e13cc0dbf7ad049aecab204f4032acded2c75c28c4a9

    • SHA512

      af27bab8159a4ee7a1e009656a0e9b6a482aaaf9d315cd6264517d6b8689fc796db5c208a39b9fe4077acd2ab5e832daf3cf18227c28d3e6e3260ed0cdbc24cc

    • SSDEEP

      12288:9wrxQOrPOZVJHK66J/O2e/xzmD75CLL9w2HMt6J/sEaYjdT5lnSBJ:9c0VJ6J/OL/ZmD75ibFaoFl

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks