General

  • Target

    Factura Honorarios 2025-04-13.exe

  • Size

    679KB

  • Sample

    250414-qekvksxnv8

  • MD5

    f9d5459e950a2b3f401b9b4b4e5c8501

  • SHA1

    931d7959fa3ed26a0a196d6229d04a9250932feb

  • SHA256

    77b87775f59ad5a2564185b6565a5035d14298c3853ac8a70adbb8f10ff3bc8c

  • SHA512

    0cfd3a7e7a041f9fe814804e2c78ee6c19d8abb63ce5523bd3e66f83970c30ad7924d0087a9e579933f38f3429f657aa4271f0ab25b6ac17bb5eaab50894e297

  • SSDEEP

    12288:x+qbdKtjXR/tkhMizqpKPj2xOvp2Y0dWDop0b8i8nqBYmCeuU96ofXt1A7:x+qbdyRlkhdes2xgp2Y0ysYBYmCeyc1+

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7670096613:AAEY0JFb0a1CzByXhvZqUC9W4CQmo9fAmZM/sendMessage?chat_id=7911627152

Targets

    • Target

      Factura Honorarios 2025-04-13.exe

    • Size

      679KB

    • MD5

      f9d5459e950a2b3f401b9b4b4e5c8501

    • SHA1

      931d7959fa3ed26a0a196d6229d04a9250932feb

    • SHA256

      77b87775f59ad5a2564185b6565a5035d14298c3853ac8a70adbb8f10ff3bc8c

    • SHA512

      0cfd3a7e7a041f9fe814804e2c78ee6c19d8abb63ce5523bd3e66f83970c30ad7924d0087a9e579933f38f3429f657aa4271f0ab25b6ac17bb5eaab50894e297

    • SSDEEP

      12288:x+qbdKtjXR/tkhMizqpKPj2xOvp2Y0dWDop0b8i8nqBYmCeuU96ofXt1A7:x+qbdyRlkhdes2xgp2Y0ysYBYmCeyc1+

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      9b38a1b07a0ebc5c7e59e63346ecc2db

    • SHA1

      97332a2ffcf12a3e3f27e7c05213b5d7faa13735

    • SHA256

      8b4c47c4cf5e76ec57dd5a050d5acd832a0d532ee875d7b44f6cdaf68f90d37c

    • SHA512

      26e77f8e10f6d8693c92bd036b53a3f6e0c523090ef8dfe479815f556ecd2b57fc90ce9f7cceebe70460d464decb27ad1fe240819fd56997764e96506b6a439c

    • SSDEEP

      192:kjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZ40QPi:U/Qlt7wiij/lMRv/9V4b4r

    Score
    3/10

MITRE ATT&CK Enterprise v16

Tasks