Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    8255dd224efb3fe22a27d63138351150e9685cc78503db0c88065635740dec53

  • Size

    726KB

  • Sample

    250325-tlqk7asl18

  • MD5

    a6078ed5c9a1a9b835396f893b796889

  • SHA1

    53072a41075528f6c0c3a309940835bed954247d

  • SHA256

    8255dd224efb3fe22a27d63138351150e9685cc78503db0c88065635740dec53

  • SHA512

    16673aa44a23c510e4eee684ac90d70e73dc7f1ac79f60e4b67ca730dafb01cac7ba0049f96f58272ff6a1b1c999454e3a8e69dc33493fc65b7ec961785ba9fa

  • SSDEEP

    12288:nWvLrSI8dfRV9ma606hi4ny3oYFbO2KkhrwNmuNmxv3yfGuiK8F4Ez/0q4vInnXF:nWvLrR0fPb9RL021rmdNgfqi/Tak

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7688589725:AAEXfrzDHwZLObnhvGxbNuF0otXr2qYoXHQ/sendMessage?chat_id=2015352628

Targets

    • Target

      jxGidTkOad4suSF.exe

    • Size

      869KB

    • MD5

      24fe4f00c34617dbda65dea7b69290fa

    • SHA1

      652ca5827811da26020b27267574e93b4e3a0a1b

    • SHA256

      2cabff0ab44ef8b5791f5ec5c5dc25f509a6ca502af94813cab8fcfcdc6abfa9

    • SHA512

      e09ecb5ee06b5f61aa7dcbd1db757851224b8822c3765eff5f5066aa761a017376eb24688534935c8c9b33120a5332e8ecfeb225d52a96c178cec5116e195952

    • SSDEEP

      12288:NMvDFVzJ+Wnqn++PtFmwH9PD3yy6EtS1YFbOWKkhrINsuNQxv3yfiuiKMF4Ezh0W:NMbHzMjowH9bZsq0W1rubNmfEid3Ho

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks