General

  • Target

    8ceadc4cdfe8f675b6c8e2ab188b76bbc89dc3e933364052eb6da188318b199f.exe

  • Size

    1.1MB

  • Sample

    250227-d8832svkz3

  • MD5

    1be417b6a5ddfc0a5e0930ee4181a297

  • SHA1

    2f351b981fea52def870f4ff6b04fc1742ac5d81

  • SHA256

    8ceadc4cdfe8f675b6c8e2ab188b76bbc89dc3e933364052eb6da188318b199f

  • SHA512

    99ed58c21ec6c288d73df21381f93a9e5f4f39ffc725c845f90c236146276b73cb6aca9b04c96fe0dacd9f459eedbc2b76bde62cc933596587c331ba09a5a87b

  • SSDEEP

    24576:au6J33O0c+JY5UZ+XC0kGso6Faa14j+x7nhduHkVprMWY:su0c++OCvkGs9FaE42iH8p7Y

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7418053275:AAEOSY1DuOetgv81Fz1cTR6zjk3nLw_p8Vg/sendMessage?chat_id=6595599138

Targets

    • Target

      8ceadc4cdfe8f675b6c8e2ab188b76bbc89dc3e933364052eb6da188318b199f.exe

    • Size

      1.1MB

    • MD5

      1be417b6a5ddfc0a5e0930ee4181a297

    • SHA1

      2f351b981fea52def870f4ff6b04fc1742ac5d81

    • SHA256

      8ceadc4cdfe8f675b6c8e2ab188b76bbc89dc3e933364052eb6da188318b199f

    • SHA512

      99ed58c21ec6c288d73df21381f93a9e5f4f39ffc725c845f90c236146276b73cb6aca9b04c96fe0dacd9f459eedbc2b76bde62cc933596587c331ba09a5a87b

    • SSDEEP

      24576:au6J33O0c+JY5UZ+XC0kGso6Faa14j+x7nhduHkVprMWY:su0c++OCvkGs9FaE42iH8p7Y

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks