General

  • Target

    AWB#5305323204643.exe

  • Size

    1.3MB

  • Sample

    250227-q77vtazlz4

  • MD5

    b45fdcd6c8fa31e0adf5f4f91c052c39

  • SHA1

    63a58e43ee53a0a2dfd04306cc3298f84a7be60b

  • SHA256

    0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f

  • SHA512

    21dffa4dfbcdf64abc3ab9f14db8a174505f4fe9c3d47dfe4a1eac55bac68f9ec59f68dfa6d5a3e9d2958c5cfc9dc8bf06e4aa30abde49655693f91f725216eb

  • SSDEEP

    24576:SV5dPaGXy3pto7WqBtRpcG9tDmBNf3fxY1pORoSfg9i+2FjC:ElyZtoSqlpHLmXf32vORoSo9i+2

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7552206830:AAGZUrvJgSRgT_tfVCG5NR-NdC35UuRR1yg/sendMessage?chat_id=6357516296

Targets

    • Target

      AWB#5305323204643.exe

    • Size

      1.3MB

    • MD5

      b45fdcd6c8fa31e0adf5f4f91c052c39

    • SHA1

      63a58e43ee53a0a2dfd04306cc3298f84a7be60b

    • SHA256

      0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f

    • SHA512

      21dffa4dfbcdf64abc3ab9f14db8a174505f4fe9c3d47dfe4a1eac55bac68f9ec59f68dfa6d5a3e9d2958c5cfc9dc8bf06e4aa30abde49655693f91f725216eb

    • SSDEEP

      24576:SV5dPaGXy3pto7WqBtRpcG9tDmBNf3fxY1pORoSfg9i+2FjC:ElyZtoSqlpHLmXf32vORoSo9i+2

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks