General
-
Target
8e5bf344843fe1296726970d4ca68f6c6d64b57140b4c3f31887c044cdcaedeb.exe
-
Size
903KB
-
Sample
250226-em5n6sxnt9
-
MD5
38031f96c7d473b3983b2ebee3bea4da
-
SHA1
caf072e0231ff27bdb6cda56e8827f16701e5260
-
SHA256
8e5bf344843fe1296726970d4ca68f6c6d64b57140b4c3f31887c044cdcaedeb
-
SHA512
2541fa8a67fc5b7af7d0cf46399207603cab7d6e09ef9fdbb9573262f9c660bc3f825ec919847a1c905ffd073ae56d7980ba1260ad794f58d3b9508ee739c1c8
-
SSDEEP
12288:5dOWSuneCyT2+gGSulAcbFYTph89ubLV+Y1mYtY+sxbfcgJK5eBKCe0BRv8iwBbT:rDnefNblIbL33tY+iEgJK5ew+kND
Static task
static1
Behavioral task
behavioral1
Sample
8e5bf344843fe1296726970d4ca68f6c6d64b57140b4c3f31887c044cdcaedeb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8e5bf344843fe1296726970d4ca68f6c6d64b57140b4c3f31887c044cdcaedeb.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk/sendMessage?chat_id=7319393351
Targets
-
-
Target
8e5bf344843fe1296726970d4ca68f6c6d64b57140b4c3f31887c044cdcaedeb.exe
-
Size
903KB
-
MD5
38031f96c7d473b3983b2ebee3bea4da
-
SHA1
caf072e0231ff27bdb6cda56e8827f16701e5260
-
SHA256
8e5bf344843fe1296726970d4ca68f6c6d64b57140b4c3f31887c044cdcaedeb
-
SHA512
2541fa8a67fc5b7af7d0cf46399207603cab7d6e09ef9fdbb9573262f9c660bc3f825ec919847a1c905ffd073ae56d7980ba1260ad794f58d3b9508ee739c1c8
-
SSDEEP
12288:5dOWSuneCyT2+gGSulAcbFYTph89ubLV+Y1mYtY+sxbfcgJK5eBKCe0BRv8iwBbT:rDnefNblIbL33tY+iEgJK5ew+kND
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2