General

  • Target

    DHL DOCs DRAFT HBL.dhl.arj.zip

  • Size

    678KB

  • Sample

    250328-qlft7syks6

  • MD5

    44ea0a0e231b70f300cdce5d93e6dcfe

  • SHA1

    c8d56c451458eb7910fb7df4679322c59ebd8d1d

  • SHA256

    c7cf9707a689129d550b803f2ee4244cd1ffa2e0ed728c46ab5a15b5ec6887f6

  • SHA512

    52f54b61a58cab874c8bf945130468ae9e98a52253d5851643f0f2d5bfd2e6a227be6d68e45821058d67a4f15b4c72903817b5947e6ae0cbb6ec2ec943fa3b83

  • SSDEEP

    12288:M9xYArgEPgi5All2mXfiZFNC8kcNsO6VJbkKd3Madkxbn66UCL7iAxP7Z:MP1oi5zSiZFNOcSLbxMFb66UCLR7Z

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7566199192:AAEZR25tLXQHCmCvfMLztJOs9b7nm-RWGV4/sendMessage?chat_id=7128988401

Targets

    • Target

      DHL DOCs DRAFT HBL.dhl.exe

    • Size

      1.1MB

    • MD5

      bb043106fec5d868e6781b4b4b02128b

    • SHA1

      517b6aa452e0e8f7e2ef010e0c6dbad654865a88

    • SHA256

      23d20b7963a72be389d28c91883e912ad016fbf2a0d8d0cc12624d5652ee160e

    • SHA512

      f73463acce3ad379d10d65e662731a48cbed8fed40de94cc24c4c7063994737dd8dfddce678080e7f80a0303226dc79bf9508eed499542cf7eeabe467fdd0cf0

    • SSDEEP

      24576:Ju6J33O0c+JY5UZ+XC0kGso6Favdstb66gCLytWY:ru0c++OCvkGs9Fav6bZDY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks