General

  • Target

    (STC) DRAFT BL.zip

  • Size

    606KB

  • Sample

    250328-qlgfqsykt4

  • MD5

    bed3fbd479f2a52fb09e1c5aeb2f65e9

  • SHA1

    6a98408d18e72d74ab16b4c30a707a83b439cc4f

  • SHA256

    42afbcb9dc2b29f59ca50c0b845fa1b28e0f22cea5c2b2ce85eb499c7b51442d

  • SHA512

    688dc443df344dfa68d07f6370857309cab9e292bfe227a3cd8ec2f1af8f5fd95ce9354675d54b82c6d0cfe1eaa0d283d9da9027972fa2bdd906f4c39742384f

  • SSDEEP

    12288:v6RJZcHjkNF8GM9F8mkBPvH5ieL5WjVr1SOeEioLMsYX4r:vEiDkNFe9xkZP5jQjVEOriPle

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7332888932:AAEd0xO46FUg-eZu8OorYiVnZ_y4D9P2pCE/sendMessage?chat_id=7128988401

Targets

    • Target

      (STC) DRAFT BL.exe

    • Size

      1023KB

    • MD5

      1f2316cbbb6f340ea45753ea5c889f11

    • SHA1

      3b49e0d165f9be0ac0443fa75ce4dcd25901dbcf

    • SHA256

      81f89461fc1feee34ad39a56fb386ed8e65eabe13416a20baa5b7adc6593e138

    • SHA512

      2c20d1fa92ac69af1f9757681dd06ae06379ba329df79bd4c14b6b04b7797a697884f0693388259481c0c3db0bf4597c845133c18902296a53804b7b59ddcc4a

    • SSDEEP

      24576:eu6J33O0c+JY5UZ+XC0kGso6FarIr1i3t07aEWY:wu0c++OCvkGs9FarZ3t0gY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks