Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    1fe6d2a8589d9b58db52cce910e7f3118d284548b53efd2a04ca290cf4784960.exe

  • Size

    993KB

  • Sample

    250325-n2h86ayqs9

  • MD5

    9d6f9f1d730e8e3ffe2da1c598159e28

  • SHA1

    675c426bec20ccc885bf4e61fd4c0ebd6d8cd5bb

  • SHA256

    1fe6d2a8589d9b58db52cce910e7f3118d284548b53efd2a04ca290cf4784960

  • SHA512

    b4c87257f717a650748a5bdbe97f75ba9223caf0b635a3c59b99e514d20e4a8315ea6e8dfd09f913b939b7cb2adc623d503ad950946ac2092e5f8469cc5ba395

  • SSDEEP

    24576:Ru6J33O0c+JY5UZ+XC0kGso6Fay1QZX+Q4TzWY:Du0c++OCvkGs9Fay4Y

Malware Config

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7323823089:AAFBRsTW94zIpSoDS8yfGsotlQLqF2I6TU0/sendMessage?chat_id=5013849544

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.vvtrade.vn
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    qVyP6qyv6MQCmZJBRs4t

Targets

    • Target

      1fe6d2a8589d9b58db52cce910e7f3118d284548b53efd2a04ca290cf4784960.exe

    • Size

      993KB

    • MD5

      9d6f9f1d730e8e3ffe2da1c598159e28

    • SHA1

      675c426bec20ccc885bf4e61fd4c0ebd6d8cd5bb

    • SHA256

      1fe6d2a8589d9b58db52cce910e7f3118d284548b53efd2a04ca290cf4784960

    • SHA512

      b4c87257f717a650748a5bdbe97f75ba9223caf0b635a3c59b99e514d20e4a8315ea6e8dfd09f913b939b7cb2adc623d503ad950946ac2092e5f8469cc5ba395

    • SSDEEP

      24576:Ru6J33O0c+JY5UZ+XC0kGso6Fay1QZX+Q4TzWY:Du0c++OCvkGs9Fay4Y

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks