General

  • Target

    DHL DOCs DRAFT HBL.pdf.z.zip

  • Size

    678KB

  • Sample

    250328-qlft7syks8

  • MD5

    8754021c2dcaa955cdbb62feed2ad9e4

  • SHA1

    a9cddf036160077a470e22f17573de5e6023d235

  • SHA256

    17c5de063c9570e50b5ea39670d5bc1ea640d94c8c96cf199e5b23a952463397

  • SHA512

    40a5368a9e06f4979d2bb3d962922f3f6ff7ad4adf1109681fab3c6291b3b03e94050e8ee26c62dd11d12fdd81743495d6721b34dc733a024e485e48629a71f6

  • SSDEEP

    12288:to/58GVkAo/FQuaWqx0b3qgLM2knYSQ3zb+KYukX0SN1YDjGaTaKDvKC8n:i6dNQuWxSvMPYS6zaKYuk10j5ThKC+

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7566199192:AAEZR25tLXQHCmCvfMLztJOs9b7nm-RWGV4/sendMessage?chat_id=7128988401

Targets

    • Target

      DHL DOCs DRAFT HBL.pdf.exe

    • Size

      1.1MB

    • MD5

      6992b405b10dbf2bc8a90a12173b57da

    • SHA1

      9f59faf24d451b068e1b02ad3c63577f635e81dc

    • SHA256

      fb9e0b4298f1727f9be78e30fed5916dc226491d46b12d69b3321b77b9a22445

    • SHA512

      ce74d7344c7c33abcdef8b85b5699b70a229aedec8aef66db193e0280076e9594f542768b7ef6197e9bcccfc58b935b27679df995c7e7f4c8e2a03b50429fa3c

    • SSDEEP

      24576:Au6J33O0c+JY5UZ+XC0kGso6FaDxKYQkdij5TSqWY:qu0c++OCvkGs9FaDoYQkd4TmY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks