General

  • Target

    PO8620801.pdf.exe

  • Size

    892KB

  • Sample

    250414-k51qtsvyav

  • MD5

    60d3c0ba8ba14dc2070d16baf18a1986

  • SHA1

    244244ab1ebda098d7792eaea063cbad5fb16945

  • SHA256

    77b6742a4beccef32d22a13aa555eb35537265ecc3662f845d48a86dc126c875

  • SHA512

    d3304af1f4e3cc82fa4caa56e100f27efe1276a93697dc5a74ec6e540c3a9a44b1fde5c4ce7e798a1de1b89c88bd6c950f5b397becdf5aa6d476cb7b08263aa6

  • SSDEEP

    12288:Uoi6cfy84PI96XOnna8NymofY/6ZPcnrVGh06v75VZbuOY78cXrzzfdWsYYT:Xi6cWwYsYmoYTrVyl7buOW3zlnf

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.puyehuechile.cl
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Daem2024.

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7734343353:AAEmQvfIoOWaFhz75a3JZ6hyXwpiKyq7nnY/sendMessage?chat_id=7049826127

Targets

    • Target

      PO8620801.pdf.exe

    • Size

      892KB

    • MD5

      60d3c0ba8ba14dc2070d16baf18a1986

    • SHA1

      244244ab1ebda098d7792eaea063cbad5fb16945

    • SHA256

      77b6742a4beccef32d22a13aa555eb35537265ecc3662f845d48a86dc126c875

    • SHA512

      d3304af1f4e3cc82fa4caa56e100f27efe1276a93697dc5a74ec6e540c3a9a44b1fde5c4ce7e798a1de1b89c88bd6c950f5b397becdf5aa6d476cb7b08263aa6

    • SSDEEP

      12288:Uoi6cfy84PI96XOnna8NymofY/6ZPcnrVGh06v75VZbuOY78cXrzzfdWsYYT:Xi6cWwYsYmoYTrVyl7buOW3zlnf

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks