General

  • Target

    BL COPY.zip

  • Size

    731KB

  • Sample

    250328-qlft7swwgy

  • MD5

    c53ad446b2077815b8440412a286d61f

  • SHA1

    cbe4619cda2bb1d6759046f0f2cd28876ed17b56

  • SHA256

    c65ef37556875134a7f8257d28eeab0e86ae047384b1e10789ddce7849a218f9

  • SHA512

    a41ff9cdebc3f5aa107a90652d1ac72d308d480cef3303e4847edfebc00c4a92a7763b176f71a947deeb7f4b25fbdd5431611928e55e7e3ccd77675044f1c321

  • SSDEEP

    12288:EzLALLSdOY/qPf7osPXDntvz6XUXDHmKkV8vvQS4A7GDDFkhuQDATv1+wdTMt6V:WLWGUYW7h7ntbxjvvQpDDFkAGATNTdTZ

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7880695616:AAENozN8WOdwjoCVV_2D6rKFh3wITQQLD2U/sendMessage?chat_id=8163760674

Targets

    • Target

      cbqF2LKJ5jjucHN.exe

    • Size

      823KB

    • MD5

      59b0d8480d8086e59beab7f733e228d6

    • SHA1

      e6599ec28f519a933d645dce34903d58037b70ba

    • SHA256

      858b05871417e4a87e4a6019beb128a9f6f924fc7a21ee24b5d6438dc1ebf3e8

    • SHA512

      1c9a2824d14ffd6188318adcde1808ddfb152162e6efd2f972ba01e58461791588041507edef06261e1d7d2cedf807161eebf84f9fe0723fc2acb620c1c69527

    • SSDEEP

      12288:fxWeuT+gzSAKqPf7OsPXD5tvT2ZUXDHKKkVUv9QQ4A5GDjF+h4uDATvV+wdTa3Ly:fPqr7n75tLZ5v9QTDjF+ekAT9TdTa3

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks