General

  • Target

    AWB#5305323204643.exe

  • Size

    1.3MB

  • Sample

    250228-g8zfdss1az

  • MD5

    f7979f9059fea1ba99990d0dbf0be034

  • SHA1

    fbb9fdf6571b1ab4d6f3338e412bb852f791c3e5

  • SHA256

    728ecae4c2085d8050b5228cb0246aeb67c3eba6115847a6fe6b2caab6220b12

  • SHA512

    c63eb04ca44cd11607f0f2ccd5b1b7a1814c60517207c57addf4af6498d46def1debfc48cc53f16331cb840c96bb5d5d8c46093b7f9373fbd871c22d41e853ed

  • SSDEEP

    24576:tAzOg/JQyeOe3VLhqHNH6hz8Q+GGuJqMdnaQA+FWxa2k3/VLfB0r555:pg/JQ1OqhGlE1neQWlk3tLf+

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7552206830:AAGZUrvJgSRgT_tfVCG5NR-NdC35UuRR1yg/sendMessage?chat_id=6357516296

Targets

    • Target

      AWB#5305323204643.exe

    • Size

      1.3MB

    • MD5

      f7979f9059fea1ba99990d0dbf0be034

    • SHA1

      fbb9fdf6571b1ab4d6f3338e412bb852f791c3e5

    • SHA256

      728ecae4c2085d8050b5228cb0246aeb67c3eba6115847a6fe6b2caab6220b12

    • SHA512

      c63eb04ca44cd11607f0f2ccd5b1b7a1814c60517207c57addf4af6498d46def1debfc48cc53f16331cb840c96bb5d5d8c46093b7f9373fbd871c22d41e853ed

    • SSDEEP

      24576:tAzOg/JQyeOe3VLhqHNH6hz8Q+GGuJqMdnaQA+FWxa2k3/VLfB0r555:pg/JQ1OqhGlE1neQWlk3tLf+

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks