General

  • Target

    14042025_0800_Factura Honorarios 2025-04-13.exe.iso

  • Size

    1.2MB

  • Sample

    250414-jwb6fask16

  • MD5

    a43690006f999bebe2139e3fe6d97a8e

  • SHA1

    9b99b2350eccb0e3364eb58ce0b52ced18e953d5

  • SHA256

    c5b839e4603fa32deed0bade7c42073f6bcd2c775637ae9467e299b6b32944af

  • SHA512

    600551e12feb78b63f137bada5eb2541ebd96a0257af41085d01ec43356df98ba1518abe995a31f020b831ee5a59346c3ef139de6431f8bd01740b9642865988

  • SSDEEP

    24576:x+qbdyRlkhdes2xgp2Y0ysYBYmCeyc1A:M4dyRlkhEnx+2S8VyA

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7670096613:AAEY0JFb0a1CzByXhvZqUC9W4CQmo9fAmZM/sendMessage?chat_id=7911627152

Targets

    • Target

      Factura Honorarios 2025-04-13.exe

    • Size

      679KB

    • MD5

      f9d5459e950a2b3f401b9b4b4e5c8501

    • SHA1

      931d7959fa3ed26a0a196d6229d04a9250932feb

    • SHA256

      77b87775f59ad5a2564185b6565a5035d14298c3853ac8a70adbb8f10ff3bc8c

    • SHA512

      0cfd3a7e7a041f9fe814804e2c78ee6c19d8abb63ce5523bd3e66f83970c30ad7924d0087a9e579933f38f3429f657aa4271f0ab25b6ac17bb5eaab50894e297

    • SSDEEP

      12288:x+qbdKtjXR/tkhMizqpKPj2xOvp2Y0dWDop0b8i8nqBYmCeuU96ofXt1A7:x+qbdyRlkhdes2xgp2Y0ysYBYmCeyc1+

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      9b38a1b07a0ebc5c7e59e63346ecc2db

    • SHA1

      97332a2ffcf12a3e3f27e7c05213b5d7faa13735

    • SHA256

      8b4c47c4cf5e76ec57dd5a050d5acd832a0d532ee875d7b44f6cdaf68f90d37c

    • SHA512

      26e77f8e10f6d8693c92bd036b53a3f6e0c523090ef8dfe479815f556ecd2b57fc90ce9f7cceebe70460d464decb27ad1fe240819fd56997764e96506b6a439c

    • SSDEEP

      192:kjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZ40QPi:U/Qlt7wiij/lMRv/9V4b4r

    Score
    3/10

MITRE ATT&CK Enterprise v16

Tasks