General

  • Target

    27022025_1828_27022025_ENV_AC_7108.PDF.rar

  • Size

    846KB

  • Sample

    250227-w34v9avsdt

  • MD5

    18b54a29cd3cd50ee4e19cfa5068f95b

  • SHA1

    cc866ec5ca0ee91bdee3fd807aa51d9f0d8a1e44

  • SHA256

    94b9481e10fa8c73e2d9210307b9fc801789c90e7d019b52aa350fb2874211d5

  • SHA512

    3a1dbd6271186f95f6d4e06e78e0322a3517fff7b04551173ac114308a735b5e4eeb4b9d1ff4930f9ebd4bde73236b25a3d6ab39073e4749d65fbcd1f9d18147

  • SSDEEP

    24576:eXBMaNmxWH65tYiYWmp4okK1wSYFF3P8fzYW6Hqc:eXms65l7K1wvrf8Ih

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7745751910:AAGY46QDCTWO_Pw9iDqZhkNij-i4uwbMgzE/sendMessage?chat_id=7695061973

Targets

    • Target

      diploidic.exe

    • Size

      965KB

    • MD5

      719dbfa5b2d54de14124bee416c8ced5

    • SHA1

      6d7cf9b197b48385746515c41aaa5f6763ab058c

    • SHA256

      3321c56f762ab7b56b78cdc7c4a0f1675f5b72b85f9328a62ab00169c44ce816

    • SHA512

      a92387e5f6852818a0bedaa1c1970ba92016cb373937ce95ee94ecc2fa1bb17cbc8379c466d66346088a4f0eac39097c398a8aa93ce7db06cbc7298144ac32c5

    • SSDEEP

      24576:DfYzitFHRyl1Ts+SRAZimn34BNIEOlyGmsYu8g7++072+W7g:rYywuAQO4BNIEpG8u8gswg

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      192639861e3dc2dc5c08bb8f8c7260d5

    • SHA1

      58d30e460609e22fa0098bc27d928b689ef9af78

    • SHA256

      23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6

    • SHA512

      6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc

    • SSDEEP

      192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks