General
-
Target
14042025_0904_kelivn.exe.iso
-
Size
1.2MB
-
Sample
250414-k6mwcsvycx
-
MD5
c75d564fde957baf88589269150e5318
-
SHA1
b1462e95d57d0764db364ca2984e1cde0d12cb0d
-
SHA256
188f9b719f24aaf73655af22e8ed2228a22b9045fd6e3ab96c39dea2edb03933
-
SHA512
65b152befd8db2177ca486c831580f2523d4876eec67a86ee3c113e4771f21d639fc3df7c2ae89a0250b7cb1389d208709a2d092cdcd275db0032414fac7578b
-
SSDEEP
24576:y+qCRva5Sg7HTSYDI93KihO7WCafmCePk1A:l05S0FmzOe7ZA
Static task
static1
Behavioral task
behavioral1
Sample
kelivn.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250313-en
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7834598939:AAFj8m-2kxM1EMsJuJcRikBu2XJcBLqyVTc/sendMessage?chat_id=7534008929
Targets
-
-
Target
kelivn.exe
-
Size
677KB
-
MD5
4875ae9940b3b14f9c6c9444f20d9dbe
-
SHA1
185cfd7bb21f13457c12a848f6c7a8372e7ef2ec
-
SHA256
18036ef7ea07672835b6f92dba5e92a833be93cc1fd788e050a64b2a931c97cf
-
SHA512
0c864435332a281a9669f65474a02fa61c8650d47338571016b75a3df8a7cd69adb5a1945e7be8fb33446a600f2c6e82a05e527aa11b9bd76968eb6621d28f28
-
SSDEEP
12288:z+qCR9W/vWvSca5Sxm7T4qvqMvbcvYDfgabdi3Ki8ejxXiT76pCafmCeuByUt1A:z+qCRva5Sg7HTSYDI93KihO7WCafmCex
-
Guloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
9b38a1b07a0ebc5c7e59e63346ecc2db
-
SHA1
97332a2ffcf12a3e3f27e7c05213b5d7faa13735
-
SHA256
8b4c47c4cf5e76ec57dd5a050d5acd832a0d532ee875d7b44f6cdaf68f90d37c
-
SHA512
26e77f8e10f6d8693c92bd036b53a3f6e0c523090ef8dfe479815f556ecd2b57fc90ce9f7cceebe70460d464decb27ad1fe240819fd56997764e96506b6a439c
-
SSDEEP
192:kjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZ40QPi:U/Qlt7wiij/lMRv/9V4b4r
Score3/10 -
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2