General

  • Target

    81f89461fc1feee34ad39a56fb386ed8e65eabe13416a20baa5b7adc6593e138

  • Size

    1023KB

  • Sample

    250328-swe2rsxyf1

  • MD5

    1f2316cbbb6f340ea45753ea5c889f11

  • SHA1

    3b49e0d165f9be0ac0443fa75ce4dcd25901dbcf

  • SHA256

    81f89461fc1feee34ad39a56fb386ed8e65eabe13416a20baa5b7adc6593e138

  • SHA512

    2c20d1fa92ac69af1f9757681dd06ae06379ba329df79bd4c14b6b04b7797a697884f0693388259481c0c3db0bf4597c845133c18902296a53804b7b59ddcc4a

  • SSDEEP

    24576:eu6J33O0c+JY5UZ+XC0kGso6FarIr1i3t07aEWY:wu0c++OCvkGs9FarZ3t0gY

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7332888932:AAEd0xO46FUg-eZu8OorYiVnZ_y4D9P2pCE/sendMessage?chat_id=7128988401

Targets

    • Target

      81f89461fc1feee34ad39a56fb386ed8e65eabe13416a20baa5b7adc6593e138

    • Size

      1023KB

    • MD5

      1f2316cbbb6f340ea45753ea5c889f11

    • SHA1

      3b49e0d165f9be0ac0443fa75ce4dcd25901dbcf

    • SHA256

      81f89461fc1feee34ad39a56fb386ed8e65eabe13416a20baa5b7adc6593e138

    • SHA512

      2c20d1fa92ac69af1f9757681dd06ae06379ba329df79bd4c14b6b04b7797a697884f0693388259481c0c3db0bf4597c845133c18902296a53804b7b59ddcc4a

    • SSDEEP

      24576:eu6J33O0c+JY5UZ+XC0kGso6FarIr1i3t07aEWY:wu0c++OCvkGs9FarZ3t0gY

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks