General
-
Target
BL COPY.zip
-
Size
731KB
-
Sample
250328-qlft7swwgy
-
MD5
c53ad446b2077815b8440412a286d61f
-
SHA1
cbe4619cda2bb1d6759046f0f2cd28876ed17b56
-
SHA256
c65ef37556875134a7f8257d28eeab0e86ae047384b1e10789ddce7849a218f9
-
SHA512
a41ff9cdebc3f5aa107a90652d1ac72d308d480cef3303e4847edfebc00c4a92a7763b176f71a947deeb7f4b25fbdd5431611928e55e7e3ccd77675044f1c321
-
SSDEEP
12288:EzLALLSdOY/qPf7osPXDntvz6XUXDHmKkV8vvQS4A7GDDFkhuQDATv1+wdTMt6V:WLWGUYW7h7ntbxjvvQpDDFkAGATNTdTZ
Static task
static1
Behavioral task
behavioral1
Sample
cbqF2LKJ5jjucHN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
cbqF2LKJ5jjucHN.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7880695616:AAENozN8WOdwjoCVV_2D6rKFh3wITQQLD2U/sendMessage?chat_id=8163760674
Targets
-
-
Target
cbqF2LKJ5jjucHN.exe
-
Size
823KB
-
MD5
59b0d8480d8086e59beab7f733e228d6
-
SHA1
e6599ec28f519a933d645dce34903d58037b70ba
-
SHA256
858b05871417e4a87e4a6019beb128a9f6f924fc7a21ee24b5d6438dc1ebf3e8
-
SHA512
1c9a2824d14ffd6188318adcde1808ddfb152162e6efd2f972ba01e58461791588041507edef06261e1d7d2cedf807161eebf84f9fe0723fc2acb620c1c69527
-
SSDEEP
12288:fxWeuT+gzSAKqPf7OsPXD5tvT2ZUXDHKKkVUv9QQ4A5GDjF+h4uDATvV+wdTa3Ly:fPqr7n75tLZ5v9QTDjF+ekAT9TdTa3
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-