General

  • Target

    SecuriteInfo.com.Trojan.PackedNET.3247.29066.16938.exe

  • Size

    1.1MB

  • Sample

    250227-cwh6es1vht

  • MD5

    86e60136bf56230dcabe7559841cd584

  • SHA1

    bcad517cfc39f78d3341d6f947f5187656bfa26e

  • SHA256

    07f2e4626e3ff2952ff9683c2f88047ae9e272f1301f1b0232c3e6bbb1618fa9

  • SHA512

    ec670afa4ef0a675ac749e345192d59a44d6260cc4fa7f10976be68813c9bde81290e7be476c8471c4ace908158b7613872a98aefc4fea1f13f714bef378927f

  • SSDEEP

    24576:eoVjvmJMUG3s0PVEd7Ng33JTUz/bH8lGMvc+WGn:PB3jA608l7E+WGn

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7170890959:AAElMC-MH2d54uixSWnB3n9GGxu8k0ZCcw0/sendMessage?chat_id=6915394402

Targets

    • Target

      SecuriteInfo.com.Trojan.PackedNET.3247.29066.16938.exe

    • Size

      1.1MB

    • MD5

      86e60136bf56230dcabe7559841cd584

    • SHA1

      bcad517cfc39f78d3341d6f947f5187656bfa26e

    • SHA256

      07f2e4626e3ff2952ff9683c2f88047ae9e272f1301f1b0232c3e6bbb1618fa9

    • SHA512

      ec670afa4ef0a675ac749e345192d59a44d6260cc4fa7f10976be68813c9bde81290e7be476c8471c4ace908158b7613872a98aefc4fea1f13f714bef378927f

    • SSDEEP

      24576:eoVjvmJMUG3s0PVEd7Ng33JTUz/bH8lGMvc+WGn:PB3jA608l7E+WGn

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks