Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    6f9732d7530f016af9997e2174313d1d80fa9422e9f40a67b7452d28c2b58c45

  • Size

    687KB

  • Sample

    250328-evzswstmz7

  • MD5

    ed55cfd373826b4600402feaf4979c25

  • SHA1

    d7a0e85e77d7d3daaff650ce03e35cd50afc732e

  • SHA256

    6f9732d7530f016af9997e2174313d1d80fa9422e9f40a67b7452d28c2b58c45

  • SHA512

    4cc13c0884758d73a63a36041e1874b7932ab4c47a3661ddebe18e1d55d783331e4b559932dc4052a8db3d0ca2d3fea63335ff84783c494d7a7dab8cf7e1ab40

  • SSDEEP

    12288:b7mA2AC9vjsPRc9NymBPyQJY5VdOBFJ8x25oja1p:b7mA2AKoW90mhyIMVYO26j0

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.steadfastlogistics.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    slf@2023

Targets

    • Target

      HPichHAekHXL0i2.exe

    • Size

      735KB

    • MD5

      25eaa2d8a1a973c77f37f07c0f0dd2fe

    • SHA1

      57f72cf8d22f5fd5e0472a928faeb938b7a362e7

    • SHA256

      1792b62467af9326272e0190ddd1e22c6217f23637ab47b9fbe0098ca3800c6d

    • SHA512

      487ef85e16c835b552e1ec43489e6c2b44a9d41b365c869a95f3206f3f75a5ed7842991a745222e1e36276411769bb36f8f4eec4824b22ddde82e2f0a94f2eb3

    • SSDEEP

      12288:NbdQiKaxRvjVoNUy/zS9iDCQJU5dlAW37yFPYELKa:pdQibRZy/cQCIwdlf3Qr

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks